Author: David Paquette
-
Zerto Virtual Manager Appliance – What You Need to Know
In Zerto 9.5, Zerto introduced a new Zerto Virtual Manager Appliance (ZVMA) and an alternative to creating your own Windows-based ZVM deployment on a virtual machine. This virtual appliance is designed to be easier to deploy, easier to manage/maintain, and more secure. If you are an existing Zerto customer with Windows-based ZVM deployments or just…
-
Recovery: The Ultimate Line of Defense Against Ransomware
Ransomware is not only the most prevalent threat to downtime and data loss, but the frequency and severity of attacks continue to increase. Every organization, from the board level to the most basic of system users, needs to be actively defending against ransomware. There are many lines of defense, some of which your organization already…
-
Five Types of Cyberattacks You Need to Know
The threat of cyberattacks on organizations is greater than ever before. Organizations are rapidly adopting cloud services, work from home policies, and IoT, leaving their data in disparate locations, in different workloads, and at the hands of more users than ever before. In this threat landscape, it means they are leaving themselves exposed to vulnerabilities…
-
Zerto Enhances Ransomware Resilience with New Updates
According to a recent IDC report, 79% of respondents have activated a disaster response in the past 12 months, while 61% of DR responses were triggered by either ransomware or other malware. Ransomware is a growing threat that continues to be profitable for attackers. Even with organizations becoming more aware of ransomware and taking security-minded…
-
Risk Assessment: 3 Key Starting Points for Effective Business Impact Analysis
No venture is without risk. Assessing and managing risk and its potential impact on business is a critical role of business leaders. With the world becoming increasingly digital, IT departments must manage and mitigate more and more risk using both new technology and improved processes and practices. The varied risks to critical IT systems and…
-
Two Outages in Two Weeks? Get DR for AWS
Give your organization the gift of Zerto In-Cloud DR before the next outage At the end of November, I blogged about the need for disaster recovery in the cloud and also attended AWS re:Invent in Las Vegas, Nevada. It was a great conference, and I was able to see some great AWS solutions up close and personal both from the AWS team and other vendors. But I am not…
-
Cloud Alone Is Not Enough. You Still Need Disaster Recovery.
Cloud benefits, including accessibility and elasticity, are many. But the cloud isn’t infallible to disasters. An IT disaster that leaves an organization without its data and applications can be crippling, if not fatal. The world has become increasingly reliant on access to data and digital services, and prolonged outages may cost your organization lost business,…
-
7 Key Zerto Features for Ransomware Resilience
Ransomware continues to cause headaches, sleepless nights, disruptions, and heavy financial losses to organizations around the world. What makes ransomware so different and more challenging than other types of malware is its ability to severely disrupt the operations of the organizations it hits. By removing access to data, ransomware is halting IT operations and all…
-
Beat Ransomware with Recoverware
How a focus on recovery changes the outcome of ransomware attacks Data is one of the most valuable resources in business these days and it is at the heart of IT systems that keep both public and private-sector operations running. When a ransomware attack removes access to data, the effect can be crippling to an…
-
The 7 Stages of a Ransomware Attack
What happens during a ransomware attack and why recovery is critical A ransomware attack isn’t a single event. It is a series of events designed to disrupt and disable systems and to force organizations to pay large sums to recover data and get back online. By walking through 7 distinct stages of a ransomware attack,…
-
Simplify Migrations with Zerto
Zerto can migrate virtualized workloads from one part of the world to another in less time than it takes you to register for our data migration webinar. You have a million reasons why you need to move your data—consolidation, cost savings, location, new servers, and on and on. Chances are you’re dreading this major chore…
-
Disaster Recovery 101: Everything You’ve Ever Wanted to Know About DR….But Were Afraid to Ask! (Updated Sept. 2022)
In today’s evolving digital landscape, comprehensive disaster recovery (DR) solutions are more important than ever. Modern businesses can’t afford downtime or data loss, and customers expect 24/7 access to their data and applications. But as DR solutions and the threats they defend against become more complex, making the right choice about DR is imperative to…