Recent Blogs
Security of data and infrastructure has become a world in itself. Everyone talks about so many terms that it’s easy to feel overwhelmed by the possibilities of securing your data. At the same time, y...
2 months ago8.1KViews
0likes
0Comments
Typically, when a ransomware attacks a system, it encrypts the data which could be in the form of document files such as pdf, doc, excel or text files. Those attacks add extension to the encrypted fi...
2 months ago4.3KViews
1like
0Comments
With the latest release of Backup Exec, Role-based Access Control (RBAC) is introduced in the product. Organizations have different users who manage their backup environment. Each user is designat...
2 months ago3.4KViews
0likes
0Comments
Ransomwares come in all shapes and forms - they encrypt, evade and exfiltrate. How do we possibly detect attacks reliably without maintaining large databases on ransomware behaviors or re-training mo...
2 months ago3.4KViews
3likes
0Comments
2 MIN READ
Backup Exec 22.2 brings youfaster virtual machine backups powered by ReFS block cloning technology. Consolidate full backups with the help of ReFS block cloning deliver up to 95% of performance impr...
2 months ago8.7KViews
0likes
0Comments