Category: Blog

Types of Snapshot Backups Supported by ZRM

Types of Snapshot Backups Supported by ZRM

The storage snapshot is a new adoption by IT industries in this data center-powered world of virtualization and the cloud. You can add backup, replication, and recovery to that list as well. A set of reference markers for data at a particular point in time is called a storage snapshot. Storage snapshots are excellent tools …

How To | Download Amanda Enterprise Server and Client Binaries

How To | Download Amanda Enterprise Server and Client Binaries

This how-to article is a step by step guide on how to download and install Amanda Enterprise Software and use the Zmanda Management Console (ZMC). Zmanda Management Console (ZMC) is a web application that supports Amanda Enterprise on the latest versions of Internet Explorer, Mozilla Firefox, and Google Chrome. ZMC manages all backup and recovery …

How To Fight Ransomware With Tape Backup

How To Fight Ransomware With Tape Backup

Ransomware is one of the most crippling cyberattacks a business can face. Visiting a compromised website or opening an infected email attachment can make your data inaccessible and halt your daily activities. Ransomware has emerged as one of cybersecurity’s most leading and continuous threats. According to the FBI, in 2016, ransomware payments reached more than …

Cloud Storage vs Cloud Backup-01-min (3)

Cloud Storage Vs Cloud Backup: What’s The Difference?

Cloud Storage vs. Cloud Backup. Aren’t they both the same? The statement is just one of the many misconceptions or myths regarding online backup. Public-private-Hybrid cloud infrastructure has narrowed the lines between cloud storage and cloud backup, making it hard to distinguish between the two. In fact, some even use the terms interchangeably. Even though …

How_to_Detect_Malicious_Database_Activity_with_Zmanda-01-min

How to Detect Malware in a MySQL Database

A malicious user can find vulnerabilities that will exploit an organization’s MySQL database. Thus, monitoring database activity should be a core practice of every business. Hackers unleash attacks designed to steal confidential data, and their primary targets are an organization’s MySQL database servers. Databases are known to be one of the most compromised assets. Why …