Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

NAKIVO

How to Use Improved Retention | Backup Retention Policy

NAKIVO Backup & Replication offers two approaches to creating a backup retention policy and scheduling: legacy and improved retention. Follow the steps in this video to learn how to create multiple schedules with unique retention and immutability periods within a single backup job using the improved retention approach.

How to Install Kubernetes on Ubuntu

Manual deployment of Docker containers on multiple servers can be highly time-consuming, monopolizing the schedule of any system administrator charged with the task. In the modern IT industry, the popularity of clouds, microservices and containers continues to grow, and for this reason, solutions such as Kubernetes were developed.

Cloud Disaster Recovery: A Complete Overview

The cloud provides multiple benefits for running services and storing data. Just like with data stored on-premises, data stored offsite and in the cloud should be backed up. Data stored in the cloud is not invulnerable by default, as the risk of data loss is still present due to accidental deletions and cloud-specific threats. At the same time, the cloud can be useful for disaster recovery.

How to Recover a Full VMware vSphere VM From a Backup

NAKIVO Backup & Replication proporciona múltiples opciones de recuperación para máquinas virtuales VMware vSphere, permitiendo una rápida restauración de las operaciones normales de negocio en caso de interrupciones o pérdida de datos. Siga los pasos de este vídeo para aprender a recuperar completamente una máquina virtual VMware vSphere a partir de un backup existente utilizando NAKIVO Backup & Replication.

Cloud Backup Solution for Small Business: The Buyers Guide

Choosing the right backup solution is a critical decision for any business, as the wrong choice can lead to data loss, downtime, a strain on the budget, and other undesirable consequences. In this blog post, we go over the key factors for deciding on the right backup solutions for small and medium-sized businesses.

LockBit Ransomware: What You Need to Know to Protect Against It

LockBit continues to be a top threat for organizations in the very diverse ransomware landscape. In the first half of 2023, there were more successful LockBit attacks than using any other ransomware family, with BlackCat and Clop coming in second and third. LockBit continued to successfully breach the world’s top companies and governmental agencies throughout 2023.