Quantcast
Channel: Encryption – Unitrends
Browsing all 22 articles
Browse latest View live

Release 4.2.1 in Beta

Release 4.2.1 is currently in beta.  The major features of the release are support for: Windows Server 2008 and Windows Server 2008 R2 dissimilar BareMetal AIX BareMetal backup and restore Mac OS X...

View Article



341,773,015 Reasons to Encrypt Backups (or Why I Don’t Walk Around in...

It’s amazing to me how much press data breaches get and yet how few customers encrypt either their primary data or their backups.  What’s so scary about this is that this really is like lightning – the...

View Article

Climategate and Encryption

Everyone has a different take on Climategate – typically one that aligns with your opinion of the particulars of global warming held before the e-mail trove came to light. Regardless of your feelings...

View Article

What Do Backup, Nevada, and Massachusetts Have in Common? (Hint: a January 1,...

On January 1, 2010, regulatory law goes into effect in both Nevada and Massachusetts that requires any company doing business in each state to protect personal information the company collects.  The...

View Article

Backup and Deduplication Basics: Encryption and Physical Storage Density and...

Backup and Deduplication Concepts: Encryption and Physical Storage Density and Pricing The next post in a series on customer-focused issues associated with deduplication and backup. Encryption...

View Article


Backup, Compression, Encryption, Deduplication, and Replication

In the past few days, I’ve posted some fairly introductory articles concerning this subject; namely Backup and Data Reduction (Compression and Deduplication) Basics Backup, Compression, Deduplication,...

View Article

Backup, Compression, Encryption, Deduplication, and Replication: Solution

In the previous post on backup, compression, encryption, and deduplication I called out a great post by Stephen Foskett on this subject and promised I’d talk a little bit about what our company does...

View Article

How to Get Duped by Deduplication: Ignore the Impact of Encryption

How to Get Duped by Deduplication: Ignore the Impact of Encryption Encryption is the process of transforming data to make it unreadable to anyone except those who possess a key that will decrypt that...

View Article


Image may be NSFW.
Clik here to view.

What Does Backup and Full Body Scanners Have in Common?

Backup and full body scanners would at first blush appear to have little in common – but both involve people being concerned about what other people can see.  In the case of full body scanners, the Los...

View Article


Image may be NSFW.
Clik here to view.

Unitrends Recovery-Series Backup Appliances and Unitrends Enterprise Backup...

In part 1 of this article, I recounted the discussion between a reseller partner friend and me concerning differences between the physical and virtual backup appliances from Unitrends.  In part 2, I...

View Article

Gambling on Social Media

My wife and I enjoy the thrill of gambling, recreationally of course. We take the occassional trip to Vegas to experience the atmosphere. We love to win, and we budget how much we can lose. On the...

View Article

Google Apps, the Cloud, Disaster Recovery, and Backup

Google announced synchronous replication for Google apps.  Of course, Google has a multi-million dollar marketing budget – so they didn’t announce replication, they announced “backup and disaster...

View Article

Backup and Deduplication Basics: Encryption and Physical Storage Density and...

Backup and Deduplication Concepts: Encryption and Physical Storage Density and Pricing The next post in a series on customer-focused issues associated with deduplication and backup. Encryption...

View Article


Backup, Compression, Encryption, Deduplication, and Replication

In the past few days, I’ve posted some fairly introductory articles concerning this subject; namely Backup and Data Reduction (Compression and Deduplication) Basics Backup, Compression, Deduplication,...

View Article

Backup, Compression, Encryption, Deduplication, and Replication: Solution

In the previous post on backup, compression, encryption, and deduplication I called out a great post by Stephen Foskett on this subject and promised I’d talk a little bit about what our company does...

View Article


How to Get Duped by Deduplication: Ignore the Impact of Encryption

How to Get Duped by Deduplication: Ignore the Impact of Encryption Encryption is the process of transforming data to make it unreadable to anyone except those who possess a key that will decrypt that...

View Article

What Does Backup and Full Body Scanners Have in Common?

Backup and full body scanners would at first blush appear to have little in common – but both involve people being concerned about what other people can see.  In the case of full body scanners, the Los...

View Article


Going Beyond the Insurance Metaphor for Data Protection

[This is the third excerpt from our How to Sell Backup to Your CFO whitepaper. Download the full version of the whitepaper for instant gratification.] Like all metaphors, the insurance metaphor for...

View Article

Key Features to a Better Backup Appliance: Heterogeneity and Resistance to...

This is my sixth and final excerpt from my Deduplication Devices Are Backup Appliances, the Check Is in the Mail and Other Lies whitepaper. Download the full whitepaper for instant gratification. In my...

View Article

Unitrends Recovery-Series Backup Appliances and Unitrends Enterprise Backup...

In part 1 of this article, I recounted the discussion between a reseller partner friend and me concerning differences between the physical and virtual backup appliances from Unitrends. In part 2, I...

View Article
Browsing all 22 articles
Browse latest View live


Latest Images