Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
How to conduct a data privacy audit, step by step
The vital importance of a data privacy audit can't be underestimated in today's climate of proliferating customer data, more stringent regulations and sophisticated cyber threats. Continue Reading
Caution: There are many ways to lose SaaS data
As the number of organizations using SaaS apps grows, data loss becomes a larger concern. Unfortunately, there appears to be a lot of confusion about where that loss stems from. Continue Reading
Data backup failure: Top 5 causes and tips for prevention
What can you do to prevent data backup failure? Learn how using the 3-2-1 rule, turning to cloud backup and following other practical steps can help protect your data. Continue Reading
-
Full vs. incremental vs. differential: Comparing backup types
Evaluate full vs. incremental vs. differential backup, as well as newer types of backup, in synthetic and incremental-forever, to determine what's best for your organization. Continue Reading
Craft a secure and reliable backup redundancy strategy
Backup and redundancy are not interchangeable. By using both, backup admins can avoid critical data loss and help ensure recovery. However, watch out for some common missteps. Continue Reading
RAID 6 vs. RAID 10: Which is better to prevent data loss?
There are numerous RAID configurations to choose from, but navigating the nuances of each can take a lot of work. In the case of RAID 6 and 10, both have distinct pros and cons.Continue Reading
Box backup tips, options and considerations
Backing up Box data? Look at your organization's retention policies, compliance requirements and complementary tools to form a solid Box backup strategy.Continue Reading
An easy 10-step guide for testing backups
Creating and adopting a data backup plan is only the first step. To achieve complete data protection, you also need a backup testing strategy.Continue Reading
Use immutable backups to prevent data loss, boost compliance
Immutable backups have gained traction with the rise in ransomware attacks. However, there are different approaches to immutability and external factors that come in to play.Continue Reading
Which backup standards guide a data protection strategy?
A strong data protection strategy must follow applicable standards and regulations to protect data and comply with privacy laws. What are some key standards to look out for?Continue Reading
-
5 common data protection challenges that businesses face
Overcoming data protection challenges is no easy feat, but with a comprehensive understanding of the issues, you can develop a strategy for dealing with them.Continue Reading
Data sanitization techniques: Standards, practices, legislation
An effective data sanitization process lessens the chance that your organization's valuable data could be stolen or compromised, and enhances compliance.Continue Reading
Top 2020 data backup tips target remote protection, cloud
From improved security to SaaS protection, these data backup tips are important for your business, especially in an IT world changed by the coronavirus pandemic.Continue Reading
6 common Backup Exec error codes and how to resolve them
Backup Exec, which is now under the Veritas brand, is one of the top names in data protection. If a Backup Exec error occurs, it may be one of the codes analyzed below.Continue Reading
How can I best implement an active archive environment?
Examine the major elements of an active archiving environment, including the kinds of data that you can use in one and resources to help with platform execution.Continue Reading
Backup and AI work together to enhance protection
'Artificial intelligence' might seem like a buzzword, but it can provide valuable services. Explore how backup and AI can improve protection for your organization.Continue Reading
2 important edge data storage backup best practices
Edge data storage backup has become a key component of data protection plans. File sync-and-share software can complement this important backup process.Continue Reading
How to resolve 5 Veritas NetBackup status code messages
NetBackup status codes present varying degrees of challenges, from general errors to failed restores. Dive into details about how to fix some of the more common issues.Continue Reading
5 tips for remote backup systems to strengthen your defense
There are lots of options for remote backup. Take the time to evaluate your needs in the age of remote work and construct your backup platform wisely.Continue Reading
Post-pandemic data backup and recovery planning guidelines
Following the coronavirus pandemic, you might have to modify your backup and recovery strategy. Overcome the data protection challenges presented by the changes in daily life.Continue Reading
Overcome common cloud backup security issues in remote work
Your cloud backup and storage usage may be on the rise. Make sure you take the necessary security precautions detailed here to keep your data protected.Continue Reading
What are Microsoft Teams backup and recovery best practices?
Backup and recovery of Microsoft Teams is often a complex process. Explore these guidelines to help simplify the important protection of your Teams data.Continue Reading
10 guidelines to secure your data backup
Data backups are essential to effective security, but backup mismanagement can often increase security woes. Luckily, there are some best practices that can help.Continue Reading
The importance of data backup policies and what to include
It's important to document your data backup and recovery policy. Take the first step and download our template and use this structure for developing other IT policies.Continue Reading
Hardware replication vs. software replication: The differences
Hardware replication and software replication have different use cases and pros and cons, so it's important to do your research before choosing one over the other.Continue Reading
Ensure your backup networking and infrastructure work together
How can you effectively modify your backup process to fit your network speed? Because bandwidth constantly varies, employ best practices for a range of scenarios.Continue Reading
How cloud backup can help remote workers
As a result of the coronavirus pandemic, some companies that were hesitant before may finally push the button for cloud backup. Remote data is a solid use case.Continue Reading
Ensure remote backup system protection amid coronavirus pandemic
Don't let a pandemic ruin priceless enterprise data. Here's how your organization can safely preserve and back up remote data generated by employees at home.Continue Reading
How to keep physical backup media storage safe
Data is your organization's most important digital asset. Here are some tips on how to ensure physical data backups are stored at a safe and secure location.Continue Reading
3 ways automated backup can aid your data protection
Automated backup can help you meet all-important recovery point objectives. Take advantage of automation in the backup process, as it can improve your recovery down the line.Continue Reading
5 important Docker container backup best practices
With container storage a major trend, it's important to ensure data protection. These five guidelines will help you properly back up Docker containers.Continue Reading
How can your ransomware backup strategy improve?
It's time to review your strategy for ransomware backup and recovery. While there are standard ways to protect your organization, newer technologies could save your business.Continue Reading
Challenges with hybrid cloud backup and how to solve them
Hybrid backup is a popular method, but the combination of local and cloud storage increases complexity. Make sure you're managing your backed-up data effectively.Continue Reading
10 steps to creating an effective data backup strategy
A common denominator in well-functioning backup infrastructures is effective process and control. This checklist highlights 10 areas to help build a better backup practice.Continue Reading
In your data archive strategy, how long is long enough?
Hoarding large amounts of data increases costs and management time. Here's how to painlessly separate the wheat from the chaff for your data archive strategy.Continue Reading
What are 3 cloud backup security guidelines against cyberattacks?
Cloud security is a top concern for IT. As a result, keeping cloud backups secure should be a priority. Here are three straightforward guidelines to help.Continue Reading
Archive vs. backup and why you need to know the differences
Archiving and data backup are both key pieces of data protection. They can complement each other, but both provide distinct and important capabilities.Continue Reading
Data protection technologies changing the market
The world of data protection is constantly evolving, and organizations need to be prepared with an arsenal of tools to face modern threats and hurdles.Continue Reading
RAID 50: How to select the right RAID level
RAID 50 combines striping with distributed parity for reduced data loss and better performance. Is RAID 50 the right configuration for your organization?Continue Reading
Protect backups from ransomware and other security risks
Backups can return your enterprises to a known good state. So it's essential to secure them by aligning your backup and security strategies for better protection and recovery.Continue Reading
How to recover from a data backup failure and move forward
Backup failures don't need to cause a long-term crisis for your organization. Make sure you're ready for this unfortunate possibility with these practical best practices.Continue Reading
Switch to a new data backup system without disruption
Your organization may be looking to transition to a new data backup platform. Avoid potential pitfalls and make the change seamlessly with these guidelines.Continue Reading
Two cloud backup problems that organizations need to consider
Don't let typical cloud backup issues slow down your organization. Stay in front of potential impacts to budget and bandwidth for a solid backup platform.Continue Reading
7 rules for effective data backup procedures
If you're responsible for data backups on multiple systems, strong policies are highly recommended. This tip gives you seven rules to follow for effective data backup procedures.Continue Reading
GDPR and backup: What have we learned in one year?
A customer's deletion request continues to be a sticking point regarding backup and GDPR compliance. Learn guidance about this issue and others, following GDPR's first birthday.Continue Reading
SaaS data protection blues cured with cloud-to-cloud backup
Your cloud-based data isn't as safe as you would think. Learn why and find out what you need to know to select the best cloud-based backup service for your SaaS applications.Continue Reading
5 biggest data backup mistakes -- and how to avoid them
Don't let a backup blunder hurt your organization or career. Here are five common, yet potentially disastrous data backup mistakes you must avoid at all costs.Continue Reading
Top 4 NAS backup strategies for your data protection
Whether justified or simply because the technology was misunderstood, backing up NAS devices was once considered a challenge. Now, you have several options for proper NAS backup.Continue Reading
Using snapshot backups for your data backup system
The quick and simple nature of snapshot backup systems can be a big win for your data protection platform. However, there are elements of snapshots that aren't great for backup.Continue Reading
The challenge of SaaS backup and how to approach it
Just because it is in the cloud doesn't mean it's safe. SaaS data backup is equally as important as backing up your on-premises workloads but has its own unique challenges.Continue Reading
5 mistakes made when backing up VMs and how to prevent them
Creating backups in virtual environments has its own challenges. Avoid some of the typical errors involving snapshots, quiescing and scheduling, and generate solid VM backups.Continue Reading
Top 8 VMware vSphere backup best practices
The architecture and operation of a virtual environment is different than a traditional backup environment and demands specific techniques. Learn top tips for backing up vSphere.Continue Reading
Protect backup from ransomware attacks and recover safely
Ransomware continues to get smarter and more sinister. Make sure you protect backups from ransomware that delays detonation and gets recovered into production.Continue Reading
Data backup security measures to take ahead of a hurricane
In this firsthand look, IT and storage expert Brien Posey details how he secured data backup and other important system elements as Hurricane Florence approached.Continue Reading
GDPR right to be forgotten and backups: What are potential problems?
Removing personal data from a database is a simple process, but eliminating that information from full backups could undermine the integrity of your data. Proceed with caution.Continue Reading
Compression, deduplication and encryption: What's the difference?
Learn the distinctions and similarities among data compression, dedupe and encryption as these data protection methods gain importance in everyday storage.Continue Reading
Preventing ransomware attacks is a top storage vendor claim
Storage vendors advance silly and not-so-silly claims about how data backup and protection technologies are the answer to ransomware prevention and growing ransomware fatalism.Continue Reading
Backup snapshots and replication supplement standard backup
Traditional backup or data snapshot and replication technologies alone don't meet the data protection and DR needs of modern enterprises. Combine them all together and they do.Continue Reading
What backup security measures protect against data breaches?
Backup security varies across different storage media. What works for tape-based backup may not work for disk backups, so plan your data protection strategy accordingly.Continue Reading
Container backup follows data persistence to these ephemeral apps
The advent of data persistence in containers necessitates having data backup in containers. Here's how this is being done and which vendors are leading the way.Continue Reading
How ransomware variants are neutralizing data backups
The latest iterations of ransomware aim to undercut backups as an effective method for recovering from attacks. Learn how to overcome this vulnerability.Continue Reading
Snapshot-based backup snaps back against cyberattacks
A flat backup approach could help your organization recover easier if it's hit by ransomware. There are snapshot-based options available from system and backup software providers.Continue Reading
What are some ghost image creation issues?
A ghost image can be used to copy the contents of one server to another for backup, but the process of creating ghost images may not be as simple as it seems.Continue Reading
Cloud backup systems are a good bet in ransomware fight
Because it's important to protect your backups against ransomware, a cloud backup system is a strong option. Critically, cloud backups are off the network.Continue Reading
Mobile device security management practices enhance data protection
While mobile security is a challenge, file sync-and-share products and mobile device management software can help protect your organization's vulnerable data.Continue Reading
Avoid Docker host backup issues on Hyper-V virtual machines
Learn about common issues associated with Docker host backup on Hyper-V and how to avoid them.Continue Reading
Are there tools that help users migrate from one backup product to another?
Backup software vendors such as CommVault offer services and/or software that assist customers with migrating from a competing product.Continue Reading
How do you perform Docker backup?
Few backup software providers offer Docker container backup support, but is there a way to back up Docker containers with any backup software?Continue Reading
Dealing with Active Directory restore challenges
What are the biggest challenges with backing up Active Directory?Continue Reading
What does CommVault Simpana 10 error code 19:757 mean?
What does CommVault Simpana 10 error code 19:757 mean and how do I resolve it?Continue Reading
What does CommVault Simpana 10 error code 19:861 mean?
What does CommVault Simpana 10 Error code 19:861 mean and how do I resolve it?Continue Reading
How can I reduce my cloud storage costs?
What are the top five ways to save money on cloud storage costs for data protection?Continue Reading
How to estimate the lifespan of backup tape media
Brien Posey offers advice on how to estimate the useful lifespan of backup tape media based on how it is used, in this Expert Answer.Continue Reading
Hypervisor-based replication in VMware and Hyper-V
Independent backup expert Brien Posey discusses native hypervisor-based replication in VMware and Hyper-V, in this Expert Answer.Continue Reading
Resolving CommVault Simpana error code 91:29
Independent backup expert Brien Posey details what causes CommVault Simpana error 91:29 and how to resolve it in this Expert Answer.Continue Reading
Why backup monitoring software is growing in popularity
Brien Posey discusses why backup monitoring software is growing in popularity and how it can help IT admins ensure effective backups.Continue Reading
Ten common reasons why virtual machine backups fail
Virtual machine backups can fail, and when they do, you must determine the cause of the failure. Here are 10 common reasons for VM backup failure.Continue Reading
Ten common reasons for VM restore failure
When a VM restore fails, you must troubleshoot quickly. Event logs are a good start, but can be cryptic. Here are 10 causes of VM restore failures.Continue Reading
Misconceptions about using a single platform for backup and archive
Brien Posey discusses how backup and archive can be accomplished using a single software platform today and common misconceptions about this approach.Continue Reading
Choosing the right data snapshot approach
Independent backup expert Brien Posey compares the various methods for creating a data snapshot in this Expert Answer.Continue Reading
Crash-consistent vs. application-consistent backups of virtual machines
Marc Staimer of Dragon Slayer Consulting compares crash-consistent and application-consistent backups of virtual machines in this Expert Answer.Continue Reading
Techniques for performing EFS recovery
IT pros face the daunting task of EFS-encrypted data, but Brien Posey offers EFS recovery tricks in this tip.Continue Reading
How to dispose of unwanted backup media
Brien Posey looks at the inherent problems with backup media disposal. Because it contains sensitive data, you must dispose of it safely.Continue Reading
Using PowerShell for bare-metal recovery
Brien Posey shows you how to create backup in PowerShell that is suitable for performing a bare-metal recovery.Continue Reading
Pros and cons of the integrated data backup appliance
Data center backup solutions are complicated; hence, the integrated data backup appliance. George Crump examines whether it is the right approach.Continue Reading
The keys to a compliance-ready records retention schedule
Data retention and destruction have become key elements of compliance, making a retention schedule essential to a successful GRC program.Continue Reading
IPhone vs. Android backup
Eric Slack of Storage Switzerland compares iPhone and Android backup in this Expert Answer.Continue Reading
Disk can help with backup tape rotation strategy
Backup expert George Crump explains how to use disk to get the most out of your backup tape rotation strategy.Continue Reading
As a backup target, when is VTL better than NAS?
Eric Slack of Storage Switzerland says that, as a backup target, a VTL might be a better choice than NAS.Continue Reading
Should you back up Google Drive contents?
George Crump of Storage Switzerland discusses whether it is necessary to back up Google Drive contents in this Expert Answer.Continue Reading
Should you back up Dropbox contents?
George Crump of Storage Switzerland discusses whether it is necessary to back up Dropbox contents in this Expert Response.Continue Reading
Microsoft ReFS backup: Ensuring compatibility and testing
Independent backup expert Brien Posey outlines important considerations for Microsoft ReFS backup in this tip.Continue Reading
Pros and cons of backup tape encryption
Independent backup expert Brien Posey outlines what's good and what's bad about backup tape encryption in this tip.Continue Reading
Solving SQL VSS writer problems during backup
Backup expert Brien Posey explains how to solve common SQL VSS writer problems users can face during SQL database backups.Continue Reading
Virtual machine backup and restoration in a Windows failover cluster
Learn about Windows failover clusters and their role in VM backups and restoration in this tip from Microsoft expert Brien Posey.Continue Reading
Performing Microsoft System Center DPM bare-metal recovery
Bare-metal recovery with Microsoft System Center DPM is easier than you might think. Brien Posey explains the process in this tip.Continue Reading
SAN backup and recovery
Moving data can complicate your backup efforts. In this tip, you’ll learn backup goals for SAN environments and backup methods to achieve those goals.Continue Reading
The value of VMware’s Changed Block Tracking (CBT)
VMware’s Changed Block Tracking is an important part of VMware’s efforts to simplify and improve the VMware virtual machine backup process.Continue Reading
Active Directory restores: How to restore deleted objects
Brien Posey shows how to perform an Active Directory restore using authoritative and non-authoritative techniques.Continue Reading
IIS backup: How to protect Microsoft Internet Information Services
This tip offers information about how to perform a Microsoft IIS backup.Continue Reading