The ability to perform backups on NAS devices and File shares made its way into Veeam Backup and Replication in version 10 and they are now starting to build out on that foundation in v11 which is currently in closed beta testing. One of these new features extends Veeam’s “instant” capabilities further such as Instant Disk Recovery or even Instant VM Recovery which is… you guessed it… Instant...
Read More
2020 has been a year of change, much of it unanticipated as the COVID-19 pandemic swept across the planet. The massive surge in work-from-home (WFH) affected hundreds of millions across the globe as more than half of the workforce was forced to shelter in place. IT teams toiled to get team members up, running, and secure in their WFH environments—wherever that might be. Keeping their...
Read More
Successful vulnerability management (VM) programs aren’t isolated programs. Successful ones include active participants from multiple teams who can share data and results with each other, so that everyone benefits from greater visibility, automation and control. And while in the past VM providers haven’t made their products easy to integrate with, that changes with Tenable.io™. We designed Tenable.io to be the most open VM solution, with...
Read More
Symantec Enterprise Customers get Enhanced Security, Manageability and Protection Symantec, a division of Broadcom (NASDAQ: AVGO), is rolling out new storage threat detection help for enterprise customers – and not a moment too soon. That’s because the explosion of cloud services and related storage attracted the attention of threat actors looking to pounce on vulnerabilities as businesses move their data beyond their four walls. At...
Read More
Anyone working in an IT shop knows server uptime is crucial. Server downtime can cause major issues, from reduced worker productivity to issues that impact the customer experience and may even lead to lost sales. But keeping downtime at a minimum isn’t as simple as just fixing problems as they arise. To keep your servers online, and avoid downtime, you need to understand what’s happening...
Read More
A new report from the U.S. government’s ICT Supply Chain Risk Management Task Force includes guidance on vulnerability management, mitigation and prioritization as key to understanding operational risk. Information communications technology (ICT) — defined by the National Institute of Standards and Technology (NIST) as “the capture, storage, retrieval, processing, display, representation, presentation, organization, management, security, transfer and interchange of data and information— is critical to...
Read More
In our mission to deliver strategies, services, and solutions that provide comprehensive cyber protection, Acronis has been actively looking to develop new data protection and cybersecurity capabilities. Some of these are developed by our team, while others are gained through strategic acquisitions. Today, we’ve added a powerful set of new services and technical expertise by acquiring CyberLynx, a leading cybersecurity consultancy based in Israel. Advanced...
Read More
To fully secure your web applications, you need several software solutions, specialist internal resources, and external contractors. However, this means significant costs and not everyone can afford it all at once. How should small businesses start their web application security journey? Let’s have a look at your options and the reasons why DAST is a clear winner as the starting point for web application security....
Read More
A rising number of cyber attacks exploit common blind spots in enterprise infrastructures. The new Symantec EDR toolset is a strong defense against attackers Cyber security is a relentless, high-stakes game of cat-and-mouse. And nowhere is this more true than in the realm of endpoint security. As enterprises have ramped up their investment in tools like endpoint protection platforms (EPP) and endpoint detection and response...
Read More
Opinion: Almost every business that has computers buys an antivirus solution. However, relatively few businesses that have their own websites buy vulnerability scanners. I believe that most people don’t buy solutions to protect their web applications not because they don’t feel that it’s necessary but because they don’t realize that effective solutions exist. Imagine talking to a friend of yours and saying that you bought...
Read More