Blog Archives

Creating Flow for Successful Disaster Recovery – NAKIVO Briefing Note

Nakivo 8 – Disaster Recovery Workflow Many backup and replication software solutions claim to help organizations recover from a disaster but just as backups are more than copying data from point A to point B, disaster recovery is more than

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

Backup Software Needs to Provide Freedom of Choice – Nakivo Backup and Replication 7.5

Backup software used to be a conduit through which data moved from primary storage to some form of protected storage. Today though, backup software vendors are increasingly forcing customers down a pre-selected path. Vendors are now bundling their solutions with

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

What is Next in Backup and Recovery? – NAKIVO Briefing Note

Data protection has changed. Most data centers are heavily virtualized, and are using more than just VMware as their hypervisor. Organizations are also well down the path of moving workloads to the cloud, most notably into Amazon EC2. Expectations of

Tagged with: , , , , , , , ,
Posted in Briefing Note

2018 SMB Disaster Preparedness Guide

Small to medium-sized businesses face unique challenges when it comes to disaster recovery. They have to deal with a much tighter budget than a larger business, while at the same time having to meet very similar recovery expectations for users.

Tagged with: , , , , , , , , , , , ,
Posted in Article

How Are Backup Software Products Responding to Ransomware?

Backup software products are starting to adopt anti-ransomware features – and that’s a good thing. Ransomware has clearly expanded beyond consumers and is regularly attacking businesses and government entities. But not every backup company is convinced this is a problem

Tagged with: , , , , , , , , , , , , , , , , , ,
Posted in Blog

Refining The Virtualized Backup Process – NAKIVO Briefing Note

The backup software market is very mature. Even virtualization specific backup software solutions have been available for over 10 years. But there is still work to do. In some cases, new releases are taking advantage of new technologies elsewhere in

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

Ransomware Protection Requires Different Protocols

The core server component of most modern backup applications run on Windows. Unfortunately, Windows is also the primary target of ransomware attacks. While there are incidents of attacks on Linux or Macs, ransomware creators are going to go for the

Tagged with: , , , , , , , ,
Posted in Blog