Tuesday, October 20th, 2020 at 12:00 p.m. CDT
Cloud Backups: what matters, what happens and how Global Data Vault and Veeam work together
Considering offsite backups, but have concerns about ransomware, and ultimately disaster recovery? It’s no wonder as there’s a lot to consider. Join us for an informative webinar about cloud backups: what matters, what happens, and how we work with Veeam to ensure these work effectively.
At the end of the session, you’ll have an understanding of:
- the basics of cloud backups
- how cloud backups happen
- how many backups you need
- what you do if you have to access your backup
- the security of cloud backups
- what you need to know when using Veeam
Global Data Vault is a Veeam Cloud and Service Provider (VCSP). While many companies offer backup-as-a-service and disaster recovery-as-a-service, we feel that we shine when it comes to customer service and meeting or exceeding customer expectations. We also understand the frustration that accompanies ambiguity when dealing with a company with undefined responsibilities, so we take all responsibility and ownership with anything related to our services.
Can’t make the webinar? Please register, and we will follow up with the presentation or schedule a private consultation.
Brian Brignac, Director of Sales, and Leslie Ferus, Territory Manager, Global Data Vault
Global Data Vault Vision
GDV is a specialized company focusing on quality, results, simplicity, and value. We also believe that there is no value in wondering about responsibilities when it comes to our services, so with Global Data Vault, it’s always our problem.
October 20 - Cloud backups: what matters, what happens, and how GDV and Veeam work together
November 17 – Success stories of how MSPs and VCSP work together
January 19 – How to protect your network: The difference between EDP, Insider Protection and Sealed Extents
Unlock Global Data Vault's Webinar Series
Provide your name and email to unlock GDV's webinar series. The webinars cover important topics such as the realities of insider threats, current malware and how insider access can be abused, and how to effectively protect against insider attacks.