Fujifilm Logo Reading Time: 2 minutes

FUJIFILM Kangaroo is a customisable turn-key ready solution with all components pre-installed and all in one location: your premises. Everything you need to archive your (cold) data for the long-term.

It includes all the hardware, software and tapes, pre-installed in a single custom box, or “naked” to be installed in your existing rack.

continue reading…
Commvault Logo Reading Time: 4 minutes

Commvault has announced (on April 29th) a new era in cleanroom technology with the new Commvault Cloud Cleanroom Recovery offering available from now.

What is a cleanroom? A cleanroom is an isolated recovery environment that is frequently used for secure cyber recovery scenarios. It’s more than just running a instant recovery or replicated VM in a isolated environment.

continue reading…
Reading Time: < 1 minute

IGEL is a small upstart German hardware company evolved over 20 years to become a leading innovator of software for cloud workspaces and EUC world.

As other big companies, they have a big international event called IGEL Disrupt.

continue reading…
Reading Time: 2 minutes

Veeam has acquired Coveware, a leading provider in cyber-extortion incident response.

Coveware combines aggregated ransomware case data, refined negotiating techniques and sound financial and operational controls to achieve superior ransomware incident response and recovery for our clients. The company created Recon and Unidecrypt, two proprietary software packages for cost analysis and ransomware decryption, respectively.

continue reading…
Logo Know&Decide Reading Time: 3 minutes

Know & Decide has been created end of 2015 in Luxembourg. It employs 17 people, including 7 developers, and will achieve a turnover of €2 million in 2024.

They provide one of the most comprehensive IT Asset Management (ITAM) solution to tackle current and coming IT challenges.

continue reading…
Reading Time: 3 minutes

On April 16th, CTERA announced the enhancement of its award-winning ransomware protection engine, CTERA Ransom Protect, with active protection against data exfiltration using honeypot decoy techniques.

CTERA Ransom Protect is an AI-powered cyber defense engine integrated into the CTERA global file system, providing zero-day protection against widespread ransomware attacks.

continue reading…
Reading Time: 2 minutes

CTERA Vault is a Read Many (WORM) protection technology that protects against risks related to data tampering.

In simple terms, CTERA Vault allows data to be written to a storage system once and then prevents any modifications and/or deletions. Think of it as a security vault for your data that is immune to ransomware, accidental deletions, and unwanted changes.

continue reading…
© 2024-2011 vInfrastructure Blog | Disclaimer & Copyright