Understand, Plan and Rehearse Ransomware Resilience series - Access and Improve
Ransomware uses stolen credentials to gain access to backup systems and then delete, encrypt or expire the backup data. For more details on how to enable these features, here are theten steps to increase your security posture.12KViews1like0CommentsGDPR Compliance Pays Off in Two Years for Large Bank
The focus on General Data Protection Regulation (GDPR) and its looming May 2018 deadline has spurred a number of conversations between CIOs and their organization’s legal teams. The questions remain basic but critical: Are we ready? And are we compliant?6.7KViews4likes2CommentsList Scratch Tapes from Standalone and send a report
Dear Experts, I am planning to automate Scratch request of Standalone tapes to be recalled from DR. I use the below query to fetch the Scratch from Standalone. vmquery -pn Scratch -b | grep "NONE" The Output lists Media Id but We need Barcode of all these media as our media Id and Barcodes are not similar, how can i achieve this.844Views0likes1CommentExciting times ahead for Women in Tech: a #LifeAtVeritas interview with Claire-Louise Green
I recently had the pleasure of catching up with Claire-Louise Green, our EMEA Marketing Director here at Veritas and I asked her about how she’s progressed her career, what it’s like working in tech and how we can encourage more women to join the IT industry. Here’s my interview with Claire-Louise, I hope you like it!4.1KViews0likes1Comment