Browsing Posts in vSecurity

Reading Time: 3 minutesOn April 16th, CTERA announced the enhancement of its award-winning ransomware protection engine, CTERA Ransom Protect, with active protection against data exfiltration using honeypot decoy techniques. CTERA Ransom Protect is an AI-powered cyber defense engine integrated into the CTERA global file system, providing zero-day protection against widespread ransomware attacks.

Reading Time: 2 minutesCTERA Vault is a Read Many (WORM) protection technology that protects against risks related to data tampering. In simple terms, CTERA Vault allows data to be written to a storage system once and then prevents any modifications and/or deletions. Think of it as a security vault for your data that is immune to ransomware, accidental deletions, and unwanted changes.

Reading Time: 2 minutesXZ Utils (formerly LZMA Utils) provides a general-purpose data-compression library plus command-line tools. March 29, 2024 is a day that will hardly be forgotten by the open source community: Andres Freund disclosed his findings about the compromise in the XZ Utils, which would enable an attacker to silently gain access to a targeted affected system. CVE-2024-3094 is a vulnerability discovered in the open-source library XZ Utils that stems from malicious code that was pushed into the library by one of its maintainers.

Reading Time: 5 minutesScality,a global leader in reliable, secure and sustainable data storage software, today announced the results of a survey of 500 IT decision-makers across France, Germany, the UK and the US to gain insight into the role immutable data storage plays in an organisation’s overall cybersecurity strategy. Key findings reveal:

Reading Time: 7 minutesTo implement some encryption solutions (like VM encryption, backup encryption, storage encryption) you need to manage symmetric keys in a secure way. Key management has always been solved with proprietary solutions. Each vendor have offered in the past their own key management server/client combination, but as the complexity of datacenters increased, this designed has shown its limits. If you have multiple components, all in need of security keys, why you would need to run multiple key management solutions? But in order to have a common solution, you first would need a protocol to let all […]

Logo Commvault

Reading Time: 4 minutesOn June, 7th Commvault announces new security capabilities across its entire portfolio signalling the next phase in its evolution helping businesses secure, defend, and recover their data to meet increasingly sophisticated cyberthreats head on. Why security must be coupled with data protection? Because data protection usually it’s just the ‘last line of defense’… but it’s no more enough.

Reading Time: 5 minutesWhat is Metallic? Metallic DMaaS (data management as a service) was introduced by Commvault in late 2019 as part of its Intelligent Data Platform to provide SaaS delivered data protection and management. Data management helps to build and maintain a data framework in order to store, ingest, transform, archive, transmit, and secure the data needed by the business. Metallic provides: Metallic DMaaS, offering protection for SaaS applications including Microsoft Office 365, Microsoft Dynamics, and Salesforce; protection for endpoints; and protection for hybrid cloud workloads including Virtual Machines, File Systems, Databases, and containers Metallic eDiscovery, offering […]

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright