Understand, Plan and Rehearse Ransomware Resilience series - Access and Improve
Ransomware uses stolen credentials to gain access to backup systems and then delete, encrypt or expire the backup data. For more details on how to enable these features, here are theten steps to increase your security posture.12KViews1like0CommentsThe power of NetBackup Deduplication: Distributed processing and secure backup streams
Data deduplication is the most popular form of storage capacity optimization. Deduplication makes it possible to store more on disk with less backend storage, hence it is a very promising method to eliminate or minimize tape as the backup medium.586Views3likes2CommentsBackup Exec 2012 security improvements
Hello, my name is Bill Brown and I'm a software developer for the Backup Exec product team. I've been working on Backup Exec (and its progenitor, Maynard Electronics Maynstream) for nearly 21 years. Over the years I've spent time in just about every part of the product but lately I've been involved in improving the security of the product.How much does a deduplication solution really cost you?
There are a number of deduplication solutions from various vendors available for you to choose from. There are plenty of discussions about various kinds of deduplication solutions and how those help to reduce the amount of secondary storage required for backups.643Views1like0CommentsEncryption Specialization Now Available
Partners – our newest Specialization is now available! The launch of the Encryption Solutions Specialization coincides with the integration of PGP and GuardianEdge channel partners into the Symantec Partner Program. This means more opportunities for you to differentiate from your competition228Views0likes0Comments