Topic: disaster recovery

  • NAKIVO v11.1: Enhanced Disaster Recovery & MSP Tools

    NAKIVO v11.1: Enhanced Disaster Recovery & MSP Tools

    NAKIVO Backup & Replication v11.1 enhances data protection with new disaster recovery tools and improved management features for MSPs, supporting virtual, physical, cloud, and SaaS infrastructures. The update introduces multilingual support in five languages, real-time replication for VMware, and...

    Read More »
  • Master Exchange Server Recovery: Essential Best Practices

    Master Exchange Server Recovery: Essential Best Practices

    A robust Exchange Server recovery strategy is essential for business continuity, requiring a well-defined disaster recovery plan to restore email services quickly with minimal data loss. Key practices include using Database Availability Groups (DAG) for high availability, distributing mailboxes a...

    Read More »
  • Semperis Unifies Identity Recovery for Faster Cyber Response

    Semperis Unifies Identity Recovery for Faster Cyber Response

    Semperis has launched Ready1 for Identity Crisis Management, a no-cost offering that integrates its identity recovery tools with a structured crisis management system to help businesses quickly resume operations after identity attacks. The platform provides automated features like a command-and-c...

    Read More »
  • Keep Payments Running During Cloud Outages

    Keep Payments Running During Cloud Outages

    Financial institutions face severe risks from relying on a single cloud provider for payments, as outages can halt transactions and cause major financial and reputational damage. Volante Technologies launched a Multi-cloud Resiliency Service to eliminate this single point of failure, ensuring pay...

    Read More »
  • FalconStor Habanero: Compliant IBM Power Backup Made Simple

    FalconStor Habanero: Compliant IBM Power Backup Made Simple

    FalconStor Habanero is a new SaaS solution designed to provide secure, compliant offsite data protection and disaster recovery for businesses using on-premises IBM Power systems, without requiring new hardware or changes to existing backup workflows. The fully managed service offers immutable cyb...

    Read More »
  • Top Cybersecurity Products Launched This Week: October 2025

    Top Cybersecurity Products Launched This Week: October 2025

    OPSWAT's MetaDefender Drive offers a portable, network-free threat scanner for securely validating temporary devices before they access protected networks. Radiflow360 integrates operational technology risk management, compliance, and incident response into a unified platform for mid-sized indust...

    Read More »
  • Nutanix Cloud Clusters Now Available on OVHcloud

    Nutanix Cloud Clusters Now Available on OVHcloud

    Nutanix Cloud Clusters (NC2) on OVHcloud offers businesses in Europe and the Middle East a hybrid multicloud platform that emphasizes European data sovereignty, regulatory compliance, and sustainable infrastructure. The partnership provides a flexible and trustworthy alternative for workload migr...

    Read More »
  • Nutanix Named a Leader in Gartner Magic Quadrant for Hybrid Infrastructure

    Nutanix Named a Leader in Gartner Magic Quadrant for Hybrid Infrastructure

    Nutanix has been named a Leader in the Gartner Magic Quadrant for Distributed Hybrid Infrastructure for the second consecutive year, highlighting its innovation and strategic execution in hybrid multicloud computing. The Nutanix Cloud Platform supports diverse environments, including major public...

    Read More »
  • Microsoft Tests Windows 365 Cloud Disaster Recovery PCs

    Microsoft Tests Windows 365 Cloud Disaster Recovery PCs

    Microsoft introduced Windows 365 Reserve, a cloud-based disaster recovery solution that provides temporary virtual desktops for up to 10 days per user during hardware or cyber incidents, ensuring business continuity. The service, currently in limited public preview, allows seamless ac...

    Read More »
  • Interactive, Port Phillip Partner to Future-Proof Community Services

    Interactive, Port Phillip Partner to Future-Proof Community Services

    The City of Port Phillip migrated its aging IT systems from a heritage-listed building to a secure, scalable cloud environment in partnership with Interactive, ensuring uninterrupted community services. The migration overcame infrastructure limitations and included rapid troubleshooting, such as ...

    Read More »
  • Hitachi & Red Hat Partner to Modernize Hybrid Cloud

    Hitachi & Red Hat Partner to Modernize Hybrid Cloud

    Hitachi Vantara and Red Hat have partnered to create a hybrid cloud solution combining OpenShift Virtualisation with VSP One, simplifying migration and reducing costs and vendor lock-in. The integrated platform allows simultaneous management of virtual machines and containers, cutting hardware an...

    Read More »
  • 3 Must-Haves to Survive a Cyberattack

    3 Must-Haves to Survive a Cyberattack

    Swift and effective response to a cyberattack depends on having clarity, control, and a reliable lifeline already in place. Clarity involves real-time detection and understanding of the incident's scope, enabling informed decisions to isolate and manage threats. Control means the ability to conta...

    Read More »
  • Oman Data Park Expands OCI Services with New Ibri Region

    Oman Data Park Expands OCI Services with New Ibri Region

    Oman Data Park has expanded its cloud services with a new Oracle Cloud Infrastructure Secondary Dedicated Region in Wilayat Ibri, enhancing Oman's digital transformation and sovereign cloud capabilities. The dual-region setup with Muscat ensures low-latency, high availability, and disaster recove...

    Read More »
  • Ready1 Restores Operations After Identity Breach Crisis

    Ready1 Restores Operations After Identity Breach Crisis

    Semperis has launched Ready1, an integrated platform for managing identity crises by combining Active Directory Forest Recovery, Disaster Recovery for Entra Tenant, and Identity Forensics services to help organizations quickly restore operations after cyberattacks. The platform features automated...

    Read More »
  • Why Ransomware Attacks Spike on Weekends

    Why Ransomware Attacks Spike on Weekends

    Threat actors deliberately target organizations on weekends and holidays when security staffing is minimal, exploiting slower detection to infiltrate systems more deeply. Business transitions like mergers and acquisitions create vulnerabilities, with 60% of incidents occurring after such shifts d...

    Read More »
  • Arctera InfoScale Uses AI to Detect and Stop Ransomware

    Arctera InfoScale Uses AI to Detect and Stop Ransomware

    Arctera's InfoScale platform now uses AI to detect and neutralize ransomware threats in real time by analyzing behavioral patterns across applications, storage, and infrastructure. The system provides full-stack visibility and application-aware actions, enabling immediate protective measures to l...

    Read More »
  • Achieve SOC 2 & ISO 27001 Backup Compliance

    Achieve SOC 2 & ISO 27001 Backup Compliance

    SOC 2 and ISO 27001 require a systematic approach to data backup, treating it as verifiable proof of operational integrity and security commitments, not just disaster recovery. SOC 2 is a U.S. audit framework focused on five Trust Services Criteria, with security as mandatory, while ISO 27001 is ...

    Read More »
  • Robot Swarm Blooms Like a Digital Garden

    Robot Swarm Blooms Like a Digital Garden

    Princeton researchers have developed a swarm of small, light-responsive robots that can collectively open and close, mimicking blooming flowers, as detailed in *Science Robotics*. Inspired by natural systems like fire ants and plants, this work aims to create adaptive building facades that could ...

    Read More »
  • Seamless VMware Migration for Uninterrupted Business

    Seamless VMware Migration for Uninterrupted Business

    Ransomware has become a common threat for businesses, making robust disaster recovery and VMware migration essential for uninterrupted operations, with a significant increase in organizations affected compared to traditional disasters. Modern VMware environments require specialized migration appr...

    Read More »
  • Wasabi's Covert Copy Boosts Cloud Storage Security

    Wasabi's Covert Copy Boosts Cloud Storage Security

    Wasabi's new Covert Copy feature creates a hidden, locked backup of cloud storage that is invisible and inaccessible to attackers, enhancing ransomware defense. It requires multi-user authentication to access the protected data and is designed for simple, cost-effective implementation with no egr...

    Read More »
  • Orange & Synamedia Expand Multi-CDN Reach at IBC 2025

    Orange & Synamedia Expand Multi-CDN Reach at IBC 2025

    Orange and Synamedia are partnering to integrate a telecommunications-grade CDN with the Quortex Switch platform, enabling flexible multi-CDN deployment for global content distribution. The collaboration leverages Orange's network in the Middle East and Africa, along with Synamedia's intelligent ...

    Read More »
  • Hypervisors: The Hidden Ransomware Risk in Virtualization

    Hypervisors: The Hidden Ransomware Risk in Virtualization

    Hypervisors are a critical but often overlooked ransomware target, as a single compromise can jeopardize hundreds of virtual machines, with traditional security tools lacking visibility into this layer. Hypervisor-based ransomware attacks surged dramatically in late 2025, driven by groups like Ak...

    Read More »
  • AWS Outage Exposes Widespread Risk of Provider Dependency

    AWS Outage Exposes Widespread Risk of Provider Dependency

    A major AWS outage originating from the US-EAST-1 region caused widespread internet disruptions, rendering popular services like Signal, Snapchat, and Amazon's Alexa inaccessible for an extended period. The root cause was identified as an internal DNS failure within AWS infrastructure, highlighti...

    Read More »