Recent Blogs
VOX Community,
I’m excited to share that Cohesity has officially combined with Veritas’ enterprise data protection business. Now that Cohesity and Veritas have joined forces, we’ve made some update...
2 months ago332Views
11likes
2Comments
In a perfect utopian world without adversaries, we wouldn't need post-quantum cryptography. But until we get there, the importance of protecting your data against current and potential future th...
3 months ago79Views
0likes
0Comments
6 MIN READ
Many customers are looking to modernize their legacy virtualization platforms to cloud-native infrastructures designed for the hybrid cloud. Red Hat OpenShift is the industry’s leading hybrid c...
4 months ago217Views
0likes
0Comments
6 MIN READ
In a perfect utopian world without adversaries, we wouldn't need post-quantum cryptography. But until we get there, the importance of protecting your data against current and potential future th...
4 months ago212Views
0likes
0Comments
Follow Chris Stapenhurst as he walks through 3 quick demonstrations showcasing Alta Surveillance Enhanced Reporting API using Power BI.
4 months ago112Views
0likes
0Comments
Ransomwares come in all shapes and forms - they encrypt, evade and exfiltrate. How do we possibly detect attacks reliably without maintaining large databases on ransomware behaviors or re-traini...
10 months ago3.7KViews
3likes
0Comments
Girishrox shares how to configure role based access in his latest YouTube video. Like and subscribe to get more updates from his channel.
10 months ago674Views
1like
1Comment
“Data is the new oil”, which is why data protection becomes crucial for organizations, government, and businesses.
Backup Exec, a leader in the small to mid-size business segment is aligned ...
10 months ago3.6KViews
1like
1Comment
With the latest release of Backup Exec, Role-based Access Control (RBAC) is introduced in the product. Organizations have different users who manage their backup environment. Each user is des...
10 months ago3.5KViews
0likes
0Comments