Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Backup

The Importance of Isolated Backups for Cybersecurity

In this video, we discuss the critical role of isolated backups in protecting your organization from cyber threats such as DDOS attacks and ransomware. We explain how disk backups are done on a daily, weekly, or monthly basis and can be stored in a safe and controlled environment, ensuring that critical data can be restored in the event of a breach. By keeping backups isolated from your network infrastructure, you can prevent cybercriminals from accessing them and ensure that your organization can recover quickly and effectively.

Schedule and Automate MongoDB Backup and Restore on Your Kubernetes Cluster

In this blog we will guide you step by step through using CloudCasa to backup and restore NoSQL databases such as MongoDB operating in your Kubernetes environment. Before we begin, let’s have some basic understanding of the database under test. NoSQL databases provide a variety of benefits including flexible data models, horizontal scaling, lightning-fast queries, and ease of use for developers.

CloudCasa and Ondat Bring Best-of-Breed Bundled Offering for Stateful Applications

CloudCasa by Catalogic and Ondat have joined forces to offer customers a combined solution stack to run and manage stateful applications on Kubernetes and provide best-of-breed performance, availability, data protection and recovery. In this episode of TFiR: Let’s Talk, Swapnil Bhartiya sits down with the executives of both companies, CloudCasa COO Sathya Sankaran and Ondat CEO Richard Olver, to talk about their partnership.

3 Ways To Address Your Kubernetes Data Protection Challenges

Kubernetes is an open-source container orchestration tool originally developed by Google for managing microservices or containerized applications across a distributed cluster of nodes. It is widely thought that “Kubernetes is key” to cloud-native application strategies. Kubernetes (K8s) runs over several nodes, and the collection of nodes is called a cluster. K8s clusters allow application developers to orchestrate and monitor containers across multiple physical, virtual, or cloud servers.

Intelligent Recovery with Trilios Continuous Restore

New Innovation Enables Data-Driven Organizations to Access ‘Single-Source-of-Truth’ Data from Multiple, Heterogeneous Clouds Simultaneously. Trilio’s Continuous Restore capability enables migration and replication of stateful applications in seconds or minutes so that all companies can protect and use their data anywhere, from core to edge—regardless of what the application runs on or where the data is stored.

How to - Disaster Recovery of a MineCraft Server on Red Hat OpenShift with Trilio

In this Video our Senior Solution Architect Rodolfo Casas is demonstrating how easy e.g. a MineCraft Server can be disaster recovered from one OpenShift Cluster to another. In this case we are talking about a DR scenario from ROSA (Red Hat OpenShift on AWS) to ARO (Azure Red Hat OpenShift Service)

Disabling Backups! - A Ransomware Story

In this session, John Goecke (CEO) discusses with Venky how everything changed for StratusVue after a ransomware attack in 2018. He shares how the construction industry is a soft target as there is no regulatory oversight, unlike in banking and healthcare, and security is always an afterthought for business owners. Along with all this, he explains complex terms like zero-day, zero-trust, FedRAMP, etc., in a highly rudimentary way.