Recent Blogs
Follow Chris Stapenhurst as he walks through 3 quick demonstrations showcasing Alta Surveillance Enhanced Reporting API using Power BI.
10 days ago58Views
0likes
0Comments
Security of data and infrastructure has become a world in itself. Everyone talks about so many terms that it’s easy to feel overwhelmed by the possibilities of securing your data. At the same time, y...
3 months ago8.1KViews
0likes
0Comments
Typically, when a ransomware attacks a system, it encrypts the data which could be in the form of document files such as pdf, doc, excel or text files. Those attacks add extension to the encrypted fi...
3 months ago4.3KViews
1like
0Comments
With the latest release of Backup Exec, Role-based Access Control (RBAC) is introduced in the product. Organizations have different users who manage their backup environment. Each user is designat...
3 months ago3.4KViews
0likes
0Comments
Ransomwares come in all shapes and forms - they encrypt, evade and exfiltrate. How do we possibly detect attacks reliably without maintaining large databases on ransomware behaviors or re-training mo...
3 months ago3.5KViews
3likes
0Comments