backup and recovery

Nutanix Simplifies Data Recovery to Thwart Ransomware Attacks
Nutanix extended an ability to detect threats that can be addressed by kicking off a recovery process that takes less than 20 minutes to execute ...
Security Boulevard

What is a Data Protection Strategy? Components, Best Practices and Benefits
Spanning Cloud Apps | | backup and recovery, Cloud and Data Security, Cybersecurity, data protection, SaaS, Spanning, zero trust security
A data protection strategy regards the measures taken to help you secure mission-critical and regulated data while keeping it usable for business purposes ...

RTO vs. RPO: Understanding Their Differences and Importance
Spanning Cloud Apps | | Backup, backup and recovery, backup policy, Cloud and Data Security, data protection, downtime
Understand the difference between RTO and RPO and why both are critical parameters in analyzing the consequences of downtime on an organization ...

Dell Launches Project Fort Zero Service to Accelerate Zero-Trust IT Shift
Dell Technologies today launched a Project Fort Zero cybersecurity services initiative that promises to make it simpler for organizations to transition to zero-trust IT environments. The initiative is based on a reference ...
Security Boulevard

Data Sovereignty: Definition, Requirements and How to Ensure It
Spanning Cloud Apps | | backup and recovery, Cloud and Data Security, data backup, data sovereignty, GDPR, SaaS, Spanning
Data sovereignty is the idea that a country or jurisdiction can govern the data generated within its borders. Learn about its significance, challenges & more ...

High Availability: How It Works and Why It’s Important
Spanning Cloud Apps | | Backup, backup and recovery, Cloud and Data Security, Compliance, Cybersecurity, data backup, data protection, downtime, high availability
High availability (HA) ensures that an IT infrastructure operates continuously, even if certain components fail. Learn why it's important and how to achieve it ...

Kaseya VSA and Datto BCDR: Your First and Last Line of Defense in Cybersecurity
Kaseya | | Backup and disaster recover (BDR), Backup and Disaster Recovery, backup and recovery, cybercrime, Cybersecurity, Endpoint Management, Kaseya VSA, VSA
All too often, we hear about companies getting hacked and paying outrageous ransoms to keep malicious actors from disclosing theRead More The post Kaseya VSA and Datto BCDR: Your First and Last ...

Dell Appliance Automates Data Protection
Dell Technologies today unveiled an integrated Dell PowerProtect Data Manager Appliance that increases cyberresilience by automatically discovering assets—including VMware virtual machines—and then taking snapshots to automatically back them up. Beginning in January, ...
Security Boulevard

The Cybersecurity Trifecta: The Secret to Immunizing PII
How much personal information would you give up for a 99-cent taco? Unfortunately, consumers have become far too willing to hand over personal details in exchange for promotions, new apps or memberships, ...
Security Boulevard

Asigra Aims to Better Secure Backup and Recovery
Asigra today added a content disarm and reconstruction (CDR) capability to its Tigris data protection platform to identify malware that might be hidden in files an organization is depending on to thwart ...
Security Boulevard