Recent Blogs
In a perfect utopian world without adversaries, we wouldn't need post-quantum cryptography. But until we get there, the importance of protecting your data against current and potential future threats...
30 days ago47Views
0likes
0Comments
6 MIN READ
Many customers are looking to modernize their legacy virtualization platforms to cloud-native infrastructures designed for the hybrid cloud. Red Hat OpenShift is the industry’s leading hybrid c...
2 months ago171Views
0likes
0Comments
6 MIN READ
In a perfect utopian world without adversaries, we wouldn't need post-quantum cryptography. But until we get there, the importance of protecting your data against current and potential future th...
2 months ago186Views
0likes
0Comments
Follow Chris Stapenhurst as he walks through 3 quick demonstrations showcasing Alta Surveillance Enhanced Reporting API using Power BI.
3 months ago91Views
0likes
0Comments
Ransomwares come in all shapes and forms - they encrypt, evade and exfiltrate. How do we possibly detect attacks reliably without maintaining large databases on ransomware behaviors or re-training mo...
8 months ago3.6KViews
3likes
0Comments
Girishrox shares how to configure role based access in his latest YouTube video. Like and subscribe to get more updates from his channel.
9 months ago643Views
1like
1Comment
“Data is the new oil”, which is why data protection becomes crucial for organizations, government, and businesses.
Backup Exec, a leader in the small to mid-size business segment is aligned to it...
9 months ago3.5KViews
1like
1Comment
With the latest release of Backup Exec, Role-based Access Control (RBAC) is introduced in the product. Organizations have different users who manage their backup environment. Each user is designat...
9 months ago3.5KViews
0likes
0Comments
Looking for a solution that enables you to restore with confidence by ensuring malware free recovery data? The new Backup Exec malware scan feature included in the latest release of Backup Exec intro...
9 months ago826Views
11likes
0Comments
Typically, when a ransomware attacks a system, it encrypts the data which could be in the form of document files such as pdf, doc, excel or text files. Those attacks add extension to the encrypted fi...
10 months ago4.4KViews
1like
0Comments