Quantcast
Channel: Encryption – Unitrends
Browsing all 24 articles
Browse latest View live

Backup, Cloud, and Security

Talking to IT people, it’s clear that there is tremendous interest in cloud-based backup and storage solutions.  For example, a recent survey by a backup company noted that 52% of respondent’s were...

View Article


Backup, Security, and Windows

Acronis recently announced a new software-only product that integrates backup and security and is targeted at home users.  While not the most original strategy, it should resonate with home and even...

View Article


Gambling on Social Media

My wife and I enjoy the thrill of gambling, recreationally of course. We take the occassional trip to Vegas to experience the atmosphere. We love to win, and we budget how much we can lose. On the...

View Article

Google Apps, the Cloud, Disaster Recovery, and Backup

Google announced synchronous replication for Google apps.  Of course, Google has a multi-million dollar marketing budget – so they didn’t announce replication, they announced “backup and disaster...

View Article

Backup and Deduplication Basics: Encryption and Physical Storage Density and...

Backup and Deduplication Concepts: Encryption and Physical Storage Density and Pricing The next post in a series on customer-focused issues associated with deduplication and backup. Encryption...

View Article


Backup, Compression, Encryption, Deduplication, and Replication

In the past few days, I’ve posted some fairly introductory articles concerning this subject; namely Backup and Data Reduction (Compression and Deduplication) Basics Backup, Compression, Deduplication,...

View Article

Backup, Compression, Encryption, Deduplication, and Replication: Solution

In the previous post on backup, compression, encryption, and deduplication I called out a great post by Stephen Foskett on this subject and promised I’d talk a little bit about what our company does...

View Article

How to Get Duped by Deduplication: Ignore the Impact of Encryption

How to Get Duped by Deduplication: Ignore the Impact of Encryption Encryption is the process of transforming data to make it unreadable to anyone except those who possess a key that will decrypt that...

View Article


What Does Backup and Full Body Scanners Have in Common?

Backup and full body scanners would at first blush appear to have little in common – but both involve people being concerned about what other people can see.  In the case of full body scanners, the Los...

View Article


Going Beyond the Insurance Metaphor for Data Protection

[This is the third excerpt from our How to Sell Backup to Your CFO whitepaper. Download the full version of the whitepaper for instant gratification.] Like all metaphors, the insurance metaphor for...

View Article

Image may be NSFW.
Clik here to view.

Key Features to a Better Backup Appliance: Heterogeneity and Resistance to...

This is my sixth and final excerpt from my Deduplication Devices Are Backup Appliances, the Check Is in the Mail and Other Lies whitepaper. Download the full whitepaper for instant gratification. In my...

View Article

Unitrends Recovery-Series Backup Appliances and Unitrends Enterprise Backup...

In part 1 of this article, I recounted the discussion between a reseller partner friend and me concerning differences between the physical and virtual backup appliances from Unitrends. In part 2, I...

View Article

Gambling on Social Media

The post Gambling on Social Media appeared first on .

View Article


Google Apps, the Cloud, Disaster Recovery, and Backup

Google announced synchronous replication for Google apps.  Of course, Google has a multi-million dollar marketing budget – so they didn’t announce replication, they announced “backup and disaster...

View Article

Backup and Deduplication Basics: Encryption and Physical Storage Density and...

Backup and Deduplication Concepts: Encryption and Physical Storage Density and Pricing The next post in a series on customer-focused issues associated with deduplication and backup. Encryption...

View Article


Backup, Compression, Encryption, Deduplication, and Replication

In the past few days, I’ve posted some fairly introductory articles concerning this subject; namely Backup and Data Reduction (Compression and Deduplication) Basics Backup, Compression, Deduplication,...

View Article

Backup, Compression, Encryption, Deduplication, and Replication: Solution

In the previous post on backup, compression, encryption, and deduplication I called out a great post by Stephen Foskett on this subject and promised I’d talk a little bit about what our company does...

View Article


How to Get Duped by Deduplication: Ignore the Impact of Encryption

How to Get Duped by Deduplication: Ignore the Impact of Encryption Encryption is the process of transforming data to make it unreadable to anyone except those who possess a key that will decrypt that...

View Article

What Does Backup and Full Body Scanners Have in Common?

Backup and full body scanners would at first blush appear to have little in common – but both involve people being concerned about what other people can see.  In the case of full body scanners, the Los...

View Article

Going Beyond the Insurance Metaphor for Data Protection

[This is the third excerpt from our How to Sell Backup to Your CFO whitepaper. Download the full version of the whitepaper for instant gratification.] Like all metaphors, the insurance metaphor for...

View Article
Browsing all 24 articles
Browse latest View live