Browsing Posts in Design

Fujifilm Logo

Reading Time: 2 minutesFUJIFILM Object Archive enables the interaction of the rapidly growing amount of data with tape storage systems, creating a sustainable and an air-gapped secure data archiving strategy.  FUJIFILM Object Archive software is a data management software that can also perform storage system management made specifically for long-term data preservation and data protection. It addresses the increasing needs for a sustainable storage tier for infrequently accessed cold data residing on flash or disk-based storage plaƞorms and reduces overall storage costs.

Fujifilm Logo

Reading Time: 2 minutesFUJIFILM Kangaroo is a customisable turn-key ready solution with all components pre-installed and all in one location: your premises. Everything you need to archive your (cold) data for the long-term. It includes all the hardware, software and tapes, pre-installed in a single custom box, or “naked” to be installed in your existing rack.

Logo Commvault

Reading Time: 4 minutesCommvault has announced (on April 29th) a new era in cleanroom technology with the new Commvault Cloud Cleanroom Recovery offering available from now. What is a cleanroom? A cleanroom is an isolated recovery environment that is frequently used for secure cyber recovery scenarios. It’s more than just running a instant recovery or replicated VM in a isolated environment.

Reading Time: 2 minutesVeeam has acquired Coveware, a leading provider in cyber-extortion incident response. Coveware combines aggregated ransomware case data, refined negotiating techniques and sound financial and operational controls to achieve superior ransomware incident response and recovery for our clients. The company created Recon and Unidecrypt, two proprietary software packages for cost analysis and ransomware decryption, respectively.

Reading Time: 3 minutesOn April 16th, CTERA announced the enhancement of its award-winning ransomware protection engine, CTERA Ransom Protect, with active protection against data exfiltration using honeypot decoy techniques. CTERA Ransom Protect is an AI-powered cyber defense engine integrated into the CTERA global file system, providing zero-day protection against widespread ransomware attacks.

Reading Time: 2 minutesCTERA Vault is a Read Many (WORM) protection technology that protects against risks related to data tampering. In simple terms, CTERA Vault allows data to be written to a storage system once and then prevents any modifications and/or deletions. Think of it as a security vault for your data that is immune to ransomware, accidental deletions, and unwanted changes.

Reading Time: 4 minutesMAID (Massive Array of Idle Disks) is a new storage technology for long-term, online storage of persistent data that takes advantage of a newer generation of SATA (Serial Advanced Technology Attachment) disk drives that are designed to be powered on and off and improve energy efficiency. This allows denser packaging of drives in large-scale disk storage systems since only 25% of disks are spinning at any one time. MAID provides for the power management of disks drives, thus creating a new service level for retaining and accessing “archive/persistent” data.

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright