Data backup security
Storage administrators are increasingly relying on encryption and other security technologies to guard sensitive data. Stay on top of the latest data backup security news and resources available with tips and advice from leading experts.
Top Stories
-
News
26 Nov 2024
Commvault's Clumio Backtrack manages AWS versioning for S3
Clumio offers management tools for AWS S3 versioning backups with granular recovery for billions of objects in its first release under the Commvault banner. Continue Reading
By- Tim McCarthy, News Writer
-
Tip
26 Nov 2024
Immutable storage: What it is, why it's used and how it works
A major benefit of immutable storage is insurance against many forms of data loss, such as malicious deletion. It's not infallible, but positives outweigh the potential drawbacks. Continue Reading
By- Julia Borgini, Spacebarpress Media
-
Tip
21 Nov 2024
U.S. data privacy protection laws: 2025 guide
Growing concerns over the processing, storage and protection of personal data, plus the GenAI effect, are leading to the passage of new local and regional privacy regulations. Continue Reading
By -
News
14 Nov 2024
Arctera emerges as spinoff from Veritas-Cohesity merger
Three separate backup and storage offerings from Veritas will continue development under the name Arctera. One analyst believes the spinoff will be a boon for SMB customers. Continue Reading
By- Tim McCarthy, News Writer
-
Feature
08 Nov 2024
Top data protection software platforms of 2025 for business
Data privacy laws, sophisticated cyberattacks and generative AI's infiltration make it imperative to invest in multifunctional data protection software, but what tools are tops? Continue Reading
By -
News
23 Oct 2024
Arcserve prioritizes cloud choice with UDP platform update
Data backup specialist Arcserve is expanding the data resilience capabilities of its flagship platform with Azure support, multi-replication and malware detection from Microsoft. Continue Reading
By- Tim McCarthy, News Writer
-
Definition
11 Oct 2024
What is the Mitre ATT&CK framework?
The Mitre ATT&CK -- pronounced miter attack -- framework is a free, globally accessible knowledge base that describes the latest behaviors and tactics of cyberadversaries to help organizations strengthen their cybersecurity strategies. Continue Reading
By- Paul Kirvan
- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
-
News
08 Oct 2024
Commvault integrates recent acquisitions into portfolio
At its Shift conference this week, Commvault will highlight new functionality for Commvault Cloud that stems from its Appranix and Clumio buys and bolsters offerings beyond Azure. Continue Reading
By- Tim McCarthy, News Writer
-
Definition
12 Sep 2024
What is secure multiparty computation (SMPC)?
Secure multiparty computation (SMPC) is a form of confidential computing that protects the privacy and security of systems and data sources, while maintaining the data's integrity. Continue Reading
-
News
12 Sep 2024
Druva's Dru Investigate guards backup data from cyberattacks
The latest generative AI service from Druva, Dru Investigate, adds a new copilot option to its backup software that identifies anomalies and offers remediation suggestions. Continue Reading
By- Tim McCarthy, News Writer
-
News
10 Sep 2024
Google Cloud Backup service expands with vault offering
The latest updates to Google Cloud's backup and recovery offering adds immutable and invisible data vaults for VMs and databases, alongside other features. Continue Reading
By- Tim McCarthy, News Writer
-
Definition
20 Aug 2024
What is continuous data protection (CDP)?
Continuous data protection (CDP), also known as 'continuous backup,' is a backup and recovery storage system in which all the data in an enterprise is backed up whenever any change is made. Continue Reading
By- Nick Barney, Technology Writer
- Stephen J. Bigelow, Senior Technology Editor
-
News
07 Aug 2024
Swedish investment firm takes majority stake in Acronis
EQT buys a majority stake in Acronis but will likely be hands off for the foreseeable future, according to Acronis CEO Ezequiel Steiner. The deal is expected to close next year. Continue Reading
By- Tim McCarthy, News Writer
-
Definition
26 Jul 2024
What is malware? Prevention, detection and how attacks work
Malware, or malicious software, is any program or file that's intentionally harmful to a computer, network or server. Continue Reading
By- Kinza Yasar, Technical Writer
- Ben Lutkevich, Site Editor
-
Definition
19 Jul 2024
What is SSD RAID (solid-state drive RAID)?
SSD RAID (solid-state drive RAID) is a methodology commonly used to protect data by distributing redundant data blocks across multiple SSDs. Continue Reading
-
Tip
17 Jul 2024
12 common virtual machine backup mistakes
Despite an administrator's best efforts, virtual machine backups can fail. Determine the cause of the failure and modify the VM backup strategy to prevent future mistakes. Continue Reading
By -
News
19 Jun 2024
Zerto to add protection, migration for KVMs
Open source Linux virtual machines are the next replication and migration target for HPE's Zerto backup and recovery tools, complementing new GreenLake capabilities. Continue Reading
By- Tim McCarthy, News Writer
-
Definition
07 Jun 2024
IT incident management
IT incident management is a component of IT service management (ITSM) that aims to rapidly restore services to normal following an incident while minimizing adverse effects on the business. Continue Reading
By- Kinza Yasar, Technical Writer
- Alexander S. Gillis, Technical Writer and Editor
-
News
05 Jun 2024
Veeam backup and security updates include cloud vault, copilot
Veeam products and services in the spotlight at the VeeamON 2024 user conference included secure backups in the cloud, a generative AI assistant and a new offering with Lenovo. Continue Reading
By- Paul Crocetti, Executive Editor
-
News
05 Jun 2024
Rubrik returns to data backups at Forward 2024
After going public in April, Rubrik is returning to its roots, saying additions to its Rubrik Security Cloud platform are all in service of backup technology. Continue Reading
By- Tim McCarthy, News Writer
-
Definition
23 May 2024
virtual firewall
A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment. Continue Reading
By- Kinza Yasar, Technical Writer
- Linda Rosencrance
-
Definition
14 May 2024
ransomware recovery
Ransomware recovery is the process of resuming operations following a cyberattack that demands payment in exchange for unlocking encrypted data. Continue Reading
By- Paul Crocetti, Executive Editor
-
News
08 May 2024
New Arcserve CEO aims to rebuild trust with customers
Outages, data loss and discontinued products have eroded trust in the Arcserve brand, but Arcserve's latest CEO, Chris Babel, wants to streamline its catalog and win back customers. Continue Reading
By- Tim McCarthy, News Writer
-
Definition
08 May 2024
Digital Personal Data Protection Act, 2023
India's Digital Personal Data Protection Act, 2023 (DPDPA) is a comprehensive privacy and data protection law that recognizes the right of individuals, referred to as "data principals," to protect their personal data during the processing of that data for lawful purposes. Continue Reading
-
Definition
07 May 2024
data protection authorities
Data protection authorities (DPAs) are public authorities responsible for enforcing data protection laws and regulations within a specific jurisdiction. Continue Reading
-
Definition
03 May 2024
data anonymization
Data anonymization describes various techniques to remove or block data containing personally identifiable information (PII). Continue Reading
-
Feature
02 May 2024
What is a data protection officer (DPO) and what do they do?
Today's DPO must juggle technical, legal and collaborative skills in the shadow of more sophisticated data breaches, tougher data privacy laws and generative AI deployments. Continue Reading
-
Definition
02 May 2024
What is Data Encryption Standard (DES)?
Data Encryption Standard (DES) is an outdated symmetric key method of data encryption. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
- Michael Cobb
-
News
01 May 2024
Backup vendors embrace GenAI, but features remain immature
Data backup and disaster recovery vendors are keeping up with the GenAI hype by quickly releasing new features -- but the use cases are limited, and their value remains unclear. Continue Reading
By- Tim McCarthy, News Writer
-
News
23 Apr 2024
Veeam acquires Coveware for incident response capabilities
Coveware will remain operationally independent with its cyberincident capabilities and ransomware research complementing the data backup vendor's recovery offerings. Continue Reading
By- Tim McCarthy, News Writer
-
News
23 Apr 2024
Cohesity adds confidential computing to FortKnox
Cohesity is partnering with Intel to bring confidential computing technology to its FortKnox vault service -- a welcome, if limited, security addition, according to experts. Continue Reading
By- Tim McCarthy, News Writer
-
Definition
18 Apr 2024
software redundant array of independent disk (software RAID)
Software RAID, also known as virtual RAID, is a form of RAID (software redundant array of independent disk) performed on an internal server. Continue Reading
By- Scott Robinson, New Era Technology
- Erin Sullivan, Senior Site Editor
-
Tip
17 Apr 2024
8 data protection challenges and how to prevent them
Businesses contend with a combination of issues spawned by data overload, privacy regulations, access rights, cyberattacks, cloud environments, generative AI and human error. Continue Reading
-
Tip
15 Apr 2024
Data protection vs. security vs. privacy: Key differences
Data protection, privacy and security might look alike but their differences can make or break a comprehensive compliance program to collect, manage, access, erase and secure data. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Feature
11 Apr 2024
7 principles of the GDPR explained
The GDPR's seven data protection principles on the lawful processing of data are directly influencing the way businesses collect, store, erase and monetize personal information. Continue Reading
-
Definition
11 Apr 2024
Data Protection Act 2018 (DPA 2018)
The Data Protection Act 2018 (DPA 2018) is a legislative framework in the United Kingdom governing the processing of personal data. Continue Reading
By- Kaitlin Herbert, Content writer
-
Feature
11 Apr 2024
AI and GDPR: How is AI being regulated?
Amid data privacy issues spawned by proliferating AI and generative AI applications, GDPR provisions need some updating to provide businesses with more specific AI guidelines. Continue Reading
-
News
10 Apr 2024
Index Engines' customized alerts aim at detecting bad actors
Index Engines' latest CyberSense observability software update features a new cloud console and user-controlled alerts to combat ransomware infections and cybercriminals. Continue Reading
By- Tim McCarthy, News Writer
-
Tip
04 Apr 2024
Data protection vs. data backup: How are they different?
They might be viewed as separate functions, but data backup should be part of an overall data protection strategy to thwart ransomware and comply with stringent privacy laws. Continue Reading
-
Tip
03 Apr 2024
How to conduct a data privacy audit, step by step
The vital importance of a data privacy audit can't be underestimated in today's climate of proliferating customer data, more stringent regulations and sophisticated cyber threats. Continue Reading
By- Jerald Murphy, Nemertes Research
-
Feature
01 Apr 2024
6 business benefits of data protection and GDPR compliance
Complying with GDPR and avoiding severe fines is a primary goal of businesses, but the data governing principles and security tools to achieve compliance yield systemic benefits. Continue Reading
By -
Feature
28 Mar 2024
11 core elements of a successful data protection strategy
Your organization's data protection strategy might not include all 11 core elements and associated activities, but the important thing is to have a comprehensive strategy in place. Continue Reading
By -
Feature
26 Mar 2024
6 data privacy challenges and how to fix them
Fragmented data protection laws, technology disruptions, AI adoption, data governance and consumer trust are among the complex issues confronting businesses in need of remedies. Continue Reading
-
Tip
22 Mar 2024
Data protection impact assessment template and tips
Conducting a data protection impact assessment is key to evaluating potential risk factors that could pose a serious threat to individuals and their personal information. Continue Reading
By -
Tip
22 Mar 2024
How to build a data protection policy, with template
Enterprises can't afford to operate without a sound data protection policy that specifies business goals, stakeholders, regulatory obligations, data classifications and access. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
15 Mar 2024
Laminar security posture tech now part of Rubrik platform
Rubrik's acquisition of Laminar last year brings new data security posture management tools to its backup platform for better visibility of user identity and activity. Continue Reading
By- Tim McCarthy, News Writer
-
Answer
28 Feb 2024
Can ransomware infect backups? 3 tips to protect data
Backing up data is one way to guard against threats such as ransomware, but attacks designed to infect backups can compromise data protection efforts. Continue Reading
By- Mitch Lewis, Evaluator Group
-
News
28 Feb 2024
Cohesity Gaia enables GenAI content creation using backups
A new generative AI capability in the Cohesity Data Cloud platform enables content creation from backup data and aims to eliminate data warehouses for common enterprise uses. Continue Reading
By- Tim McCarthy, News Writer
-
Tip
22 Feb 2024
Optimize data protection as a service with these essential tips
As a one-stop shop, DPaaS and its array of data management and protective cloud services provide security, access control, backup and recovery to safeguard mission-critical data. Continue Reading
By -
Feature
13 Feb 2024
10 enterprise cloud backup services to consider in 2024
Cloud backup is a huge category of the data protection market today. With so many providers to choose from, businesses must prioritize the features they need. Continue Reading
By -
Definition
07 Feb 2024
encryption
Encryption is the method by which information is converted into secret code that hides the information's true meaning. Continue Reading
By- Robert Sheldon
- Peter Loshin, Former Senior Technology Editor
- Michael Cobb
-
Definition
30 Jan 2024
data loss
Data loss is the intentional or unintentional destruction of information. Continue Reading
By- Erin Sullivan, Senior Site Editor
-
Definition
24 Jan 2024
encryption key management
Encryption key management is the practice of generating, organizing, protecting, storing, backing up and distributing encryption keys. Continue Reading
-
News
22 Jan 2024
Backup admins must consider GenAI legal issues -- eventually
As legal woes mount against popular LMMs powering generative AI, backup admins should work with IT to set safe and effective usage guardrails to avoid future headaches. Continue Reading
By- Tim McCarthy, News Writer
-
News
10 Jan 2024
Ransomware prevention a focus for storage stewards in 2024
In 2024, generative AI and machine learning, along with employee education, are important tools to prevent the spread of ransomware throughout the enterprise. Continue Reading
By- Tim McCarthy, News Writer
-
Definition
02 Jan 2024
data protection management (DPM)
Data protection management (DPM) is the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable. Continue Reading
-
Feature
30 Nov 2023
Records vs. document management: What's the difference?
Records and document management both help organizations share and use files, but these strategies have different goals, information, processes and systems. Continue Reading
By -
Tip
22 Nov 2023
4 data loss examples keeping backup admins up at night
Protecting data is a critical task for backup admins, and threats are ever evolving. Preparation is key to preventing data loss and recovering quickly. Continue Reading
By- Mitch Lewis, Evaluator Group
-
Tip
22 Nov 2023
Offline backups are a key part of a ransomware protection plan
Ransomware resilience relies not on a single tool, but on several layered protections. Offline backups are a critical layer in a ransomware protection strategy. Continue Reading
By- Krista Case, The Futurum Group
-
Tip
06 Nov 2023
Real-life business continuity failures: 4 examples to study
Business continuity failures are costly and can significantly harm a company's reputation. These four high-profile examples demonstrate what can go wrong when a plan fails. Continue Reading
By -
News
31 Oct 2023
CloudCasa now offers self-hosted Kubernetes backup service
A self-hosted version of CloudCasa's Kubernetes backup service provides industries with air-gapped needs recovery tools and automation. Continue Reading
By- Tim McCarthy, News Writer
-
News
24 Oct 2023
Veeam chronicles backups with journal-like features
Veeam highlights new capabilities for the Veeam Data Platform during the VeeamON Resiliency Summit, including proactive recovery and a Sophos partnership. Continue Reading
By- Tim McCarthy, News Writer
-
Opinion
25 Sep 2023
Data protection and security: A marriage of necessity?
The data protection market is fundamentally changing. An increased focus on cybersecurity and resilience efforts should shift how an organization views backup. Continue Reading
By- Jack Poller
- Christophe Bertrand
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
News
14 Sep 2023
Toyota outage shows not all backup failures are ransomware
An IT error for Toyota Motor Corporation knocked out production for a day, but the auto giant was quick to note the issue was not due to a cyberattack. Continue Reading
By- Tim McCarthy, News Writer
-
Tip
14 Aug 2023
How to create a ransomware incident response plan
A ransomware incident response plan may be the difference between surviving an attack and shuttering operations. Read key planning steps, and download a free template to get started. Continue Reading
By- Paul Kirvan
- Sharon Shea, Executive Editor
-
News
08 Aug 2023
Rubrik acquires Laminar for cloud security, data visibility
Rubrik snags Laminar Security, adding to its data security and R&D portfolio. It's a move that underscores the changes Rubrik is making to become a cybersecurity vendor. Continue Reading
By- Tim McCarthy, News Writer
-
News
20 Jul 2023
Dell PowerProtect line increases features and update cadence
Improvements to Dell Technologies' PowerProtect catalog at a more frequent pace show a transition from shipping boxes to meeting customer hybrid cloud expectations, experts say. Continue Reading
By- Tim McCarthy, News Writer
-
Definition
18 Jul 2023
cyber extortion
Cyber extortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack. Continue Reading
By- Kinza Yasar, Technical Writer
-
News
11 Jul 2023
Backup vendors build generative AI inroads with partnerships
Data backup vendors see generative AI as a complement to existing standards, but experts say the potential is still a way off and likely to be democratized across sellers. Continue Reading
By- Tim McCarthy, News Writer
-
News
30 Jun 2023
AWS sees role for quantum in data protection, but not for years
AWS execs believe advances in quantum computing will have a trickle-down effect on data protection, but enterprise-based quantum services and use cases are still a ways off. Continue Reading
By- Tim McCarthy, News Writer
-
News
12 Jun 2023
Veeam execs examine backup and security blend, other trends
Veeam leaders break down how cybersecurity issues have changed the data protection conversation. The discussion also details future plans, such as in SaaS backup and potential IPO. Continue Reading
By- Paul Crocetti, Executive Editor
-
News
07 Jun 2023
Commvault expands, automates ransomware discovery tools
In its latest release, Commvault adds advanced ransomware functionality and new security features to its data protection platform as well as unveils a new admin console. Continue Reading
By- Tim McCarthy, News Writer
-
Opinion
02 Jun 2023
Cohesity's catalysts: AI, cyber resilience and partnerships
Cohesity adds new AI capabilities to its data platform to improve cyber resilience and data management, while touting partnerships and responsible AI. Continue Reading
By- Christophe Bertrand
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
News
25 May 2023
Users dish on ransomware protection, recovery at VeeamON
To help protect against and recover from ransomware attacks, IT professionals at VeeamON 2023 recommended planning, testing and other key security measures. Continue Reading
By- Paul Crocetti, Executive Editor
-
News
23 May 2023
Veeam ransomware protection highlighted in Kasten, detection
Veeam unveiled security updates to its Kubernetes backup product at VeeamON. In addition, IDrive released an object storage appliance for users of Veeam and other backup vendors. Continue Reading
By- Paul Crocetti, Executive Editor
-
News
23 May 2023
Rubrik makes Security Cloud case to its Polaris customers
During its first stop on its world tour, Rubrik pitched its Security Cloud SaaS platform to Polaris customers by touting new features and upgrades such as support for databases. Continue Reading
By- Tim McCarthy, News Writer
-
Opinion
23 May 2023
Veeam aims to expand reach, bolster data security
Veeam's user conference centered on cyber resilience and ransomware preparedness and prevention, with new partnerships and integrations that expand its platforms. Continue Reading
By- Christophe Bertrand
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
Tip
23 May 2023
How the 3-2-1-1-0 backup rule reflects modern needs
The 3-2-1-1-0 backup rule addresses modern data protection requirements, such as ransomware protection and cloud backup. Find out how it builds on the 3-2-1 rule in this tip. Continue Reading
By -
News
18 May 2023
Acronis adds EDR to endpoint security
Acronis EDR uses Intel threat detection technology to uncover sophisticated attacks, such as fileless malware, but it also has to compete in a crowded market. Continue Reading
By- Nicole Laskowski, Senior News Director
-
News
18 May 2023
Ransomware top of mind for IT at Rubrik Forward
IT leaders at Rubrik Forward 2023 describe the challenges facing their enterprises, both in preparing for ransomware and recovering from a cyber attack. Continue Reading
By- Tim McCarthy, News Writer
-
News
18 May 2023
Zerto 10 deepens HPE integrations with backup vault hardware
The latest software update from Zerto adds support for a physical data backup vault server using HPE technology. The investment may mean sacrificing portability. Continue Reading
By- Tim McCarthy, News Writer
-
News
17 May 2023
Rubrik makes ransomware a focus for its cloud backup SaaS
At Rubrik Forward, the data protection-turned-security vendor introduces user intelligence tools and adds support for additional data sources including AWS S3. Continue Reading
-
News
15 May 2023
Ransomware blurs line between data backup, security
Ransomware is making its mark on the data backup market, with one vendor shedding its backup label for security. That transformation will be on display at Rubrik Forward 2023. Continue Reading
By- Tim McCarthy, News Writer
-
Feature
25 Apr 2023
New SaaS hacks highlight need for backup data protection
Enterprise IT and vendors alike need to prioritize strong backup data protection policies and procedures in the wake of numerous high-profile SaaS hacks and ransomware shakedowns. Continue Reading
By- Tim McCarthy, News Writer
-
Tip
30 Mar 2023
Use backup encryption to protect data from would-be thieves
Encryption is a powerful tool to keep sensitive data out of the wrong hands. To ensure recoverability after a disruption, data backup encryption is vital. Continue Reading
By -
Tip
24 Mar 2023
Use zero-trust data management to better protect backups
Backup admins looking to protect data from bad actors can implement a zero-trust strategy for added protection. However, the method is not without its downsides. Continue Reading
By -
News
08 Mar 2023
IBM Storage Defender showcases storage strategy shift
IBM is combining its data protection products and working with a new partner to address one of the biggest challenges for customers, marking the start of a new storage strategy. Continue Reading
By- Adam Armstrong, News Writer
-
News
06 Mar 2023
Latest Asigra platform targets SaaS backup for MSPs
Asigra's forthcoming SaaSBackup platform lets Asigra data protection technology protect SaaS backups. MSPs will be able to sell SDK connections through a new marketplace. Continue Reading
By- Tim McCarthy, News Writer
-
News
28 Feb 2023
BackupLabs devises SaaS backup for under-protected apps
A new SaaS backup specialist emerges from stealth to protect data in apps such as Trello, GitHub and GitLab, which CEO Rob Stevenson said have been underserved by larger players. Continue Reading
By- Tim McCarthy, News Writer
-
News
09 Feb 2023
Cohesity's 7.0 update adds protections against rogue admins
New capabilities in 7.0 update to Cohesity Data Cloud harden against human error or malice with split administrator key privileges and granular restorations. Continue Reading
By- Tim McCarthy, News Writer
-
News
01 Feb 2023
HYCU R-Cloud expands data protection for SaaS
The new R-Cloud connects SaaS data silos to HYCU's data protection capabilities for an under protected part of the IT infrastructure. Continue Reading
By- Tim McCarthy, News Writer
-
Opinion
26 Jan 2023
3 data protection and governance predictions for 2023
How should backup teams prepare for a new year? Data protection pros can adjust to a changing IT landscape by keeping an eye on ransomware, data governance and compliance. Continue Reading
By- Christophe Bertrand
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
News
30 Nov 2022
AWS expands backup, disaster recovery services
AWS adds new features and capabilities to its backup and disaster recovery services as third-party vendors look to secure hybrid and multi-cloud customers. Continue Reading
By- Tim McCarthy, News Writer
-
News
23 Nov 2022
Data resiliency guarantees offer new kind of assurance
Data resiliency guarantees from Druva, Rubrik and AvePoint offer data warranties of up to $10 million, but experts caution customers to read the fine print. Continue Reading
By- Max Bowen, TechTarget
-
News
15 Nov 2022
Cohesity launches Data Security Alliance for customers
Cohesity has formed a Data Security Alliance of 12 companies and will launch its DataHawk security service in early 2023. Both are aimed at consolidating offerings for customers. Continue Reading
By- Max Bowen, TechTarget
-
News
09 Nov 2022
Calamu, Wasabi partner to offer data storage security
Calamu and Wasabi have partnered to combine Calamu Protect with Wasabi Hot Cloud Storage, which is now available. Continue Reading
By- Max Bowen, TechTarget
-
Tip
31 Oct 2022
The ins and outs of unstructured data protection
Protecting unstructured data requires a few extra considerations for backup admins. Growing storage capacity requirements and regulatory compliance are critical. Continue Reading
By -
News
11 Oct 2022
Cohesity founder, new CEO discuss data management strategy
The current and former Cohesity CEOs seek to bring the company to 'the next level.' Plans include melding backup and security as well as potentially going public. Continue Reading
By- Paul Crocetti, Executive Editor
-
Answer
30 Sep 2022
What are some SAP HANA backup options available today?
When backing up SAP HANA databases, having the right tools for the organization is critical. Data snapshots are one option, but not the only one available. Continue Reading
-
News
22 Sep 2022
Commvault Metallic tricks ransomware to protect data
Commvault's new ThreatWise deception technology in its Metallic SaaS application tricks ransomware into triggering the alarms that alert security of a breach. Continue Reading
By- Adam Armstrong, News Writer
-
News
15 Sep 2022
Transparency, disclosure key to fighting ransomware
Current and former CISA members say the best methods for curbing ransomware attacks are organizations reporting attacks and assisting in investigations. Continue Reading
By- Tim McCarthy, News Writer
-
News
14 Sep 2022
Asigra adds new scanning capability to Tigris
Asigra has added the ability to remove ransomware infections from files while keeping the file intact with its new Content Disarm and Reconstruction feature. Continue Reading
By- Adam Armstrong, News Writer