Just as Veeam has released its latest edition of Backup & Replication, v9.5, it has also finally emerged from the shadow of a patent case completely vindicated. The case could have been very painful for Veeam had it gone the other way.
Data Protection is much more than verifying that you have a valid backup. While the recovery of your data is important, Data Protection also encompasses data life cycle management, business continuity, disaster recovery, and continuous data protection as they pertain to virtualized and cloud environments. This topic also examines how to secure and monitor the passing of data between disparate environments and how to increase the scale of data to be protected in shorter periods of time. (Read More)
How to manage the security and protection of your environment in order to safeguard your crown jewels has always been important. However, it has never been more so than today, when data-breach announcements are common and everyone from nation-states to teenagers in their bedrooms have access to powerful tools for breaking in.
Symantec has expanded its portfolio by acquiring identity protection firm LifeLock with a $2.3 billion dip into its pockets. Since Symantec divested itself of Veritas at a loss to the Carlyle Group in 2015, it has been looking to move into new markets. It acquired Blue Coat in August for $4.65 billion, a move that was seen to enhance its enterprise offerings.
Recently, I made two interesting support requests, each to a different company. Both companies asked for the output of many different commands and log files. Both balked once I explained my organization’s security policy. The policy reads simply:
No anonymized data shall be delivered to a 3rd party.
It is a simple statement, but it has a powerful effect on all data being delivered to third parties, even for support. It implies that all user, machine, and service identifiers must be tokenized, encrypted, or outright removed. What must truly remain anonymous within our data? This is not simply a support question, but rather a major issue with all data today. Do we even know what is in our data? Do you?
In this, the eighth article in our series investigating the benefits of Vembu BDR for Virtualized Environments, we carry on examining Vembu’s migration capabilities. We all know that backing up your data is only one part of the equation. The ability to recover is the other, and arguably more important, side. This is where Vembu BDR really shines.
Again life is being kind to you, and once again you are sitting in your cube, monitoring your environment. OK, you know the score by now — playing Gorf! Well your wrong you’ve stated re-playing Donkey Kong after watching the movie Pixels at Steve’s Daughters birthday party. This is more fun as both you and Steve can now have a real points tally competition. All is calm in the world and you are planning the next phases of the company cloud migration.
In this, the seventh article in our series investigating the benefits of Vembu BDR for virtualized environments, we carry on examining Vembu’s migration capabilities. We all know that backing up your data is only one part of the equation. The ability to recover is the other, and arguably more important, side. This is where Vembu BDR really shines.
For once, life is being kind to you, and again you are sitting in your cube, monitoring your environment. OK, you know the score by now—playing Gorf. Steve’s score has improved, but because your environment is all calm and joy, yours is still better. All is calm in the world, and you are planning the next phases of the company cloud migration.
DDoS happens. It happens quite a bit. It will continue to happen. Information on how to prevent DDoS is readily available, but information on how to survive is missing. DDoS is an outage. Do you have a business continuity plan that covers this sort of outage? Does your business close for the day, or do you keep running in a reduced capacity? Or do you run at full capacity? Do you have multiple approaches to your business? Do you use a variety of services?