Browsing Posts in vDesign

Reading Time: 2 minutesVeeam Backup Catalog is a feature of Veeam Backup & Replication that stands for VM guest OS file indexing. Veeam Backup Catalog comprises Veeam Guest Catalog services that run on a backup server and Enterprise Manager server. Veeam Guest Catalog service on backup server works as a local catalog service. It collects index data for backup jobs on this specific backup server and stores this data locally in the Veeam Backup Catalog folder. By default, the indexing data is stored in the VBRCatalog folder on the backup server. Veeam Backup & Replication creates the folder on a volume with the maximum amount […]

Reading Time: 2 minutesGreenfield and brownfield are terms usually used in factory planning and facilities engineering to describe two different approaches to developing or expanding manufacturing facilities. But they are also used in IT to define different deployment scenarios.

Reading Time: < 1 minuteFounded in 2009, Altaro has grown rapidly over the years. They develop backup solutions to address the core data protection needs of businesses and organizations worldwide, as well as the IT resellers, VARs, consultants and managed service providers who serve them. Now is part of Hornetsecurity, a leading global provider of next-generation cloud-based security, compliance, backup, and security awareness solutions that help companies and organizations of all sizes around the world.

Reading Time: 3 minutesNAKIVO has just released the new v10.11 of its product with enhanced IT monitoring, faster file recovery, expanded storage snapshot integration and Microsoft 365 backup functionality. NAKIVO Backup & Replication v10.11 is available for download. Customers can either update their version of the solution or install the 15-day Free Trial to check how the new features work.

Reading Time: 7 minutesTo implement some encryption solutions (like VM encryption, backup encryption, storage encryption) you need to manage symmetric keys in a secure way. Key management has always been solved with proprietary solutions. Each vendor have offered in the past their own key management server/client combination, but as the complexity of datacenters increased, this designed has shown its limits. If you have multiple components, all in need of security keys, why you would need to run multiple key management solutions? But in order to have a common solution, you first would need a protocol to let all […]

Reading Time: 2 minutesSome years ago, I’ve published a post about the Hyperconverged infrastructure market share (2018)… but what about now? How HCI has grow? HCI has become a hot topic with several vendors that aim to be a leader in this area, or with several “magic quadrants” that try to define who is in.

Logo Commvault

Reading Time: 4 minutesOn June, 7th Commvault announces new security capabilities across its entire portfolio signalling the next phase in its evolution helping businesses secure, defend, and recover their data to meet increasingly sophisticated cyberthreats head on. Why security must be coupled with data protection? Because data protection usually it’s just the ‘last line of defense’… but it’s no more enough.

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright