Data Protection Category - Page 2

Cloud Storage Security Risks for Organizations

July 6, 2023
Cloud storage and computing platforms are increasingly popular. Many organizations are migrating their data centers or applications to the c...

How to Install the NAKIVO Solution as a VMware Virtual Appliance

June 29, 2023
You can choose to deploy the NAKIVO solution on physical Windows and Linux machines, virtual machines as a virtual appliance, NAS devices an...

QNAP-Based NAS Backup Appliance Configuration with NAKIVO

June 8, 2023
Network Attached Storage (NAS) servers have been growing in popularity as reliable and convenient data protection and storage devices. Rangi...

How to Encrypt Emails in Outlook and Office 365

June 1, 2023
Whether you are sending sensitive messages to coworkers within your company or sharing confidential information with external recipients, en...

How to Build a Backup Appliance with Synology NAS: A Complete Guide

June 1, 2023
NAS devices are now popular because they are portable and provide wide functionality for data storage among other features. Synology is one...

How to Secure S3 Objects with Amazon S3 Encryption

June 1, 2023
Many companies store data in cloud storage. Cloud storage services are popular today due to their great reliability and high availability, t...

VMware Snapshot Best Practices

June 1, 2023
VMware vSphere virtual machines deliver powerful capabilities that provide agile, versatile, and efficient environments for software. One of...

Best Practices for Exchange Online Backup

June 1, 2023
If your organization has just started to use Microsoft Office 365, you may be wondering, what is Exchange Online? Exchange Online is a cloud...

How to Back Up and Recover Office 365 SharePoint Sites

June 1, 2023
SharePoint for Office 365 allows users to store files and other documents in a single place in the cloud, access the files from anywhere, an...

Full Overview of Microsoft Exchange Online Protection

June 1, 2023
Spam is unsolicited messages or other content that is sent to a high number of recipients in bulk via email. Many years ago, spam messages w...

Microsoft OneDrive Security Best Practices

June 1, 2023
Over half of corporate data in the world is in the cloud. Different types of cloud storage platforms are used by organizations to store back...

Microsoft Office 365 Advanced Threat Protection: Complete Overview

June 1, 2023
Nowadays, there are countless threats that can lead to a security breach and subsequent data loss. In 2021, spam and phishing emails were th...

Office 365 Spam Filter: Setup and Configuration

June 1, 2023
At the very least, spam emails are a nuisance. However, these unsolicited messages are also a genuine menace when they contain malicious att...

NAKIVO Backup & Replication Components: Transporter

June 1, 2023
NAKIVO Backup & Replication is a data protection and disaster recovery solution for virtual, physical, cloud and SaaS environments, incl...

What is Quiescing for VMware vSphere VMs?

June 1, 2023
When creating a snapshot in a VMware vSphere environment, there are two different methods you can follow: taking a memory state snapshot or...

How to Set Up Dell EMC Data Domain Deduplication as Backup Repository

June 1, 2023
When considering backup storage for virtual and physical environments, maximizing storage space to save costs and store more recovery points...

Top 10 Facts About Hyper-V Snapshots

June 1, 2023
Taking storage snapshots has proven to be an extremely effective feature for those working in virtual environments. However, snapshot techno...

Hyper-V Checkpoints Best Practices

June 1, 2023
Virtualization has significantly changed the way businesses conduct their operations and provide services to customers. One of the most sign...

What Is a Snapshot in AWS? AWS EBS Snapshot Explained

June 1, 2023
Amazon Elastic Block Store (Amazon EBS) is a service that provides persistent block-level storage for Amazon Elastic Compute Cloud (Amazon E...

Threat Investigation and Response in Office 365 Security

April 18, 2023
With the ever-increasing risk of cybercrimes, businesses all around the world struggle to safeguard their most prized asset: their data. Luc...