Backup Category - Page 3
AWS Backup Security Best Practices
June 1, 2023
AWS offers several cloud-based products for computing, storage, analytics, etc. Two of these products are often used by organizations for ba...
LAN-Free Backup Technologies for VMware vSphere
June 1, 2023
During a backup, large amounts of data are transferred through the networks, slowing down business-critical operations in the production env...
What Is Deduplication in Backup Data Storage
June 1, 2023
Today’s large virtual infrastructures generate a vast amount of data. This leads to an increase in backup data and in expenditure on backup...
Magnetic Tape Backup: Choose the Best Backup Practice
June 1, 2023
Disk-based and cloud-based backups are more commonly used than backup to tape due to the benefits that they provide, such as continuous data...
Tape Backup vs Disk Backup for VMs
June 1, 2023
In recent years, there has been a significant shift toward disk-based backup in terms of media used as targets by data protection solutions....
Differential Backup vs. Incremental Backup
June 1, 2023
Modern backup solutions deliver different technologies to help save on storage space requirements, cut backup windows, improve performance,...
An Overview of Microsoft Office 365 Backup Best Practices
June 1, 2023
Office 365 is a reliable cloud solution that operates using the infrastructure of Microsoft datacenters. Microsoft’s top priority is operati...
Setting Up Microsoft Office 365 Backup Policies: A How-To Guide
June 1, 2023
Despite the level of reliability provided by Microsoft, data loss in Office 365 may happen due to human error, viruses on the user’s side or...
How to Speed Up VM Backups and Improve Performance
June 1, 2023
In 2022, it is estimated that more than half of businesses worldwide use virtualization technologies and rely on backups to protect their vi...
Image-Based vs. File-Based Backup Comparison
June 1, 2023
In today’s data protection landscape, there are numerous backup types that you can use to safeguard your data. When it comes to backing up s...
Building an Effective Backup Strategy for an Organization
June 1, 2023
Companies can face different disruptions, from hardware and software failures to human errors and cyberattacks. In 2021 alone, the percentag...
Data Protection Fundamentals: How to Backup an Amazon S3 Bucket
June 1, 2023
Amazon S3 is reliable cloud storage provided by Amazon Web Services (AWS). Files are stored as objects in Amazon S3 buckets. This storage is...
OneDrive Backup vs OneDrive Sync: Myths and Facts
June 1, 2023
There are many cloud providers offering services nowadays, and it may be difficult for customers to select the right services to meet their...
What Is Synthetic Full Backup: Facts Every Sysadmin Should Know
June 1, 2023
There are multiple backup approaches, including full, incremental, and differential. Creating full backups frequently may be inconvenient an...
What Is VMware Changed Block Tracking (CBT) and How Does It Work?
June 1, 2023
VMware provides APIs to simplify data protection in enterprise virtual environments with features that enable agentless backups and improve...
Best Practices of Using SAN Storage for VM Backup
June 1, 2023
Storage Area Network (or SAN) has long been staple storage in the enterprise datacenter. Especially since virtualization has also become a m...
What is VM Backup and Replication in VMware?
June 1, 2023
VM backup and replication are essential parts of a data protection plan. At the first look, they seem similar and interchangeable, and this...
Using Amazon S3 and AWS EC2 as Cloud Backup Storage
June 1, 2023
Amazon provides compute and storage services in the cloud. Different AWS services can be used to store backups in the cloud and ensure that...
The Case for Endpoint Backup in the Age of Cloud Storage
June 1, 2023
How we work is more digital and globalized than ever. Working remotely or having employees and collaborators all over the world has become r...
Crash-Consistent vs. Application-Consistent Backup Comparison
June 1, 2023
The reliability of backups, and data protection strategies in general, depends on whether the backup data is valid and usable immediately wh...