Release 4.2.1 in Beta
Release 4.2.1 is currently in beta. The major features of the release are support for: Windows Server 2008 and Windows Server 2008 R2 dissimilar BareMetal AIX BareMetal backup and restore Mac OS X...
View Article341,773,015 Reasons to Encrypt Backups (or Why I Don’t Walk Around in...
It’s amazing to me how much press data breaches get and yet how few customers encrypt either their primary data or their backups. What’s so scary about this is that this really is like lightning – the...
View ArticleClimategate and Encryption
Everyone has a different take on Climategate – typically one that aligns with your opinion of the particulars of global warming held before the e-mail trove came to light. Regardless of your feelings...
View ArticleWhat Do Backup, Nevada, and Massachusetts Have in Common? (Hint: a January 1,...
On January 1, 2010, regulatory law goes into effect in both Nevada and Massachusetts that requires any company doing business in each state to protect personal information the company collects. The...
View ArticleBackup and Deduplication Basics: Encryption and Physical Storage Density and...
Backup and Deduplication Concepts: Encryption and Physical Storage Density and Pricing The next post in a series on customer-focused issues associated with deduplication and backup. Encryption...
View ArticleBackup, Compression, Encryption, Deduplication, and Replication
In the past few days, I’ve posted some fairly introductory articles concerning this subject; namely Backup and Data Reduction (Compression and Deduplication) Basics Backup, Compression, Deduplication,...
View ArticleBackup, Compression, Encryption, Deduplication, and Replication: Solution
In the previous post on backup, compression, encryption, and deduplication I called out a great post by Stephen Foskett on this subject and promised I’d talk a little bit about what our company does...
View ArticleHow to Get Duped by Deduplication: Ignore the Impact of Encryption
How to Get Duped by Deduplication: Ignore the Impact of Encryption Encryption is the process of transforming data to make it unreadable to anyone except those who possess a key that will decrypt that...
View ArticleWhat Does Backup and Full Body Scanners Have in Common?
Backup and full body scanners would at first blush appear to have little in common – but both involve people being concerned about what other people can see. In the case of full body scanners, the Los...
View ArticleUnitrends Recovery-Series Backup Appliances and Unitrends Enterprise Backup...
In part 1 of this article, I recounted the discussion between a reseller partner friend and me concerning differences between the physical and virtual backup appliances from Unitrends. In part 2, I...
View ArticleGambling on Social Media
My wife and I enjoy the thrill of gambling, recreationally of course. We take the occassional trip to Vegas to experience the atmosphere. We love to win, and we budget how much we can lose. On the...
View ArticleGoogle Apps, the Cloud, Disaster Recovery, and Backup
Google announced synchronous replication for Google apps. Of course, Google has a multi-million dollar marketing budget – so they didn’t announce replication, they announced “backup and disaster...
View ArticleBackup and Deduplication Basics: Encryption and Physical Storage Density and...
Backup and Deduplication Concepts: Encryption and Physical Storage Density and Pricing The next post in a series on customer-focused issues associated with deduplication and backup. Encryption...
View ArticleBackup, Compression, Encryption, Deduplication, and Replication
In the past few days, I’ve posted some fairly introductory articles concerning this subject; namely Backup and Data Reduction (Compression and Deduplication) Basics Backup, Compression, Deduplication,...
View ArticleBackup, Compression, Encryption, Deduplication, and Replication: Solution
In the previous post on backup, compression, encryption, and deduplication I called out a great post by Stephen Foskett on this subject and promised I’d talk a little bit about what our company does...
View ArticleHow to Get Duped by Deduplication: Ignore the Impact of Encryption
How to Get Duped by Deduplication: Ignore the Impact of Encryption Encryption is the process of transforming data to make it unreadable to anyone except those who possess a key that will decrypt that...
View ArticleWhat Does Backup and Full Body Scanners Have in Common?
Backup and full body scanners would at first blush appear to have little in common – but both involve people being concerned about what other people can see. In the case of full body scanners, the Los...
View ArticleGoing Beyond the Insurance Metaphor for Data Protection
[This is the third excerpt from our How to Sell Backup to Your CFO whitepaper. Download the full version of the whitepaper for instant gratification.] Like all metaphors, the insurance metaphor for...
View ArticleKey Features to a Better Backup Appliance: Heterogeneity and Resistance to...
This is my sixth and final excerpt from my Deduplication Devices Are Backup Appliances, the Check Is in the Mail and Other Lies whitepaper. Download the full whitepaper for instant gratification. In my...
View ArticleUnitrends Recovery-Series Backup Appliances and Unitrends Enterprise Backup...
In part 1 of this article, I recounted the discussion between a reseller partner friend and me concerning differences between the physical and virtual backup appliances from Unitrends. In part 2, I...
View Article