Conversations between a DataEndure SME backup engineer and customer can go like this: I need to revamp my company’s backup-and-restore solution. The script I’ve been tweaking all along is getting too complicated and error-prone. But while I’m ripping and replacing, where can I get some of that virtual recovery stuff I’ve been hearing about? We’d be happy to show you, but first let’s map out your current situation. Which of your applications… Read More
How it Looks to Use NetBackup For Your Next Virtual Migration
NetBackup is an enterprise-level backup and recovery solution developed by Veritas. It supports a variety of platforms, including many versions of AIX, HP-UX, Linux, Tru64, Solaris, Windows, and Unix. NetBackup uses a central master server to manage both clients and servers that contain the backup media. The current version of NetBackup is 7.0, which uses NetBackup OpsCenter to manage multiple NetBackup environments. OpsCenter replaces NetBackup Operations Manager (NOM), which was… Read More
HID/HIPS & Information Management: Hardening the Backup Infrastructure
Let’s take a moment to examine the potential of Symantec’s Data Center Security Agents on Veritas NetBackup Appliances They once lived happily ever after… Many of you should be familiar with the big names in information management and security. Veritas and Symantec. Once separate entities, they courted each other, merged under the same umbrella, and then due to wanting different things in life, the two companies split apart. During… Read More
How to Choose the Best Backup Technology
Today, backup technology can be very complex. Backup is no longer a matter of choosing a few physical servers and copying your data. You need to look at your recovery point objective (RPO) and recovery time objective (RTO) and determine what kind of backup plan is right for your organization. Also, you need to evaluate your infrastructure and IT team to figure out if you have the in-house resources and… Read More
What You Need Out of Your Enterprise Backup & Recovery Solution
Like patients who may not visit the dentist until their teeth hurt, we hear from many IT executives who really didn’t prioritize data recovery plans until they suffered a loss and couldn’t get all of their data back. After a natural disaster or malicious hacking attempt, no new client ever comes to us and says that in the past they did too much to create and test out detailed recovery… Read More
The Most In-Demand Security Jobs and How to Get Them
Security professionals are in demand right now. Entry-level security jobs, according to Corey Wilburn, security practice manager at DataEndure, fall into either an engineer or analyst role. Corey was recently featured in an IT Business Edge article on the five industries leading the Internet of Things revolution. He was asked his thoughts on the the most in-demand security jobs right now: “An engineer role would be primarily accountable for the… Read More
Should You Be Moving Away from Spinning Disk?
The answer is yes. Throughout my career, I have watched the industry move away from spinning disks to flash technology. Just in the past two years, I saw a big shift towards flash. There are many reasons behind this move. One of the biggest reasons is cost. Costs of Solid State Drives (SSDs) are dropping, making them more affordable, while the capacity of the drives is increasing. That is why… Read More
8 Tips for Smarter Risk Taking in IT
With the unrelenting pace of technology change and a host of new challenges and opportunities knocking on 2017’s door, CIOs know that risk-taking is par for the course in IT. The Enterprisers Project asked eight technology and business leaders to share how they cope with risks and tips for taking smarter risks in IT. Here’s what our CTO, Shahin Pirooz, had to say in their article: Celebrate Failure “I’ve built my… Read More
How does Cybercrime affect us?
DataEndure’s Digital Defense SOC-as-a-Service (SOCaaS) is an ideal solution for companies to augment their own security capabilities. Contact Us to learn more about SOCaaS. Since the turn of the century the evolving state of Cyberwarfare and Cybercrime; technologies, capabilities, and resources, has grown by leaps and bounds. The concepts of advanced threats, sponsored nation-state organizations, and highly motivated criminal organizations are relatively new, but the use of the internet and the cyber domain… Read More
- « Previous Page
- 1
- …
- 8
- 9
- 10