One of the security enhancements that came out with vSphere 8 U2 and we haven’t talked yet is vSphere 8 U2 Identity Federation with Entra ID/Azure AD. This feature is an enhancements of the vSphere identity federation feature that are part of VCP exam topics here – VCP-DCV on vSphere 8.x Objective 1.10 – Describe […]
How 365 Permission Manager from Hornetsecurity builds a game-winning strategy for M365 Compliance
Microsoft 365 (M365) is a powerful platform that offers many benefits for businesses, such as increased productivity, collaboration, and security. However, managing permissions and compliance in M365 can be challenging and time-consuming, especially when dealing with complex and dynamic environments that involve multiple apps, locations, and users. That’s why Hornetsecurity has developed 365 Permission Manager, […]
How to Make Veeam Backup and Replication 12.1 More Secure
Veeam Backup and Replication is a powerful solution for data protection and disaster recovery. It allows you to backup, replicate, and restore your virtual, physical, and cloud workloads with ease and efficiency. However, like any other software, it also requires proper security measures to prevent unauthorized access, data loss, or corruption. In this blog post, […]
Nakivo Backup and Replication 10.11 Beta release adding more features and improvements
Nakivo Backup and Replication is a powerful and reliable solution for protecting your virtual, physical, cloud, and SaaS environments. With Nakivo Backup and Replication, you can perform backup, replication, recovery, and disaster recovery for VMware, Hyper-V, Nutanix AHV, Amazon EC2, Microsoft 365, Oracle Database, and file shares. Nakivo Backup and Replication 10.11 is the latest […]
Why You Should Use Runecast Platform for Agentless OS Scanning of Your VMware vSphere VMs
Runecast Platform is a security and operations platform for VMware, cloud, and containerized infrastructures. It helps you to identify, manage, and remediate vulnerabilities and misconfigurations in your environment, as well as to ensure compliance with various standards and best practices. One of the features of Runecast Platform is the ability to perform agent-less scanning of vSphere […]
End of one Era – no more VMware perpetual licenses
This was quite expected even if I did not expect this to happen that fast. VMware by Broadcom has announced a Simplification of VMware licensing. There will be two primary offers only (VMware Cloud Foundation and VMware vSphere Foundation). Both are available as subscriptions only. Perpetual licenses are no longer available for purchase. This was […]
Veeam 12.1 Four-Eyes Authorization – prevent accidental deletion of backups and other operations with two different persons only
Veeam 12.1 Four-Eyes is a configuration where by using a new control mechanism, you’ll be able to approve certain operations in Veeam Backup and Replication, but only with the help of another Veeam admin. In other words, for example, you want to delete some backups. With this feature activated, you’ll need another admin who will […]
Why You Should Consider NoSQL for Your Application
The world today is increasingly moving towards big data. Such data helps create experiences that are geared towards the user, but it is not easy to handle. One of the technologies that have come to help meet the dynamic and versatile nature of today’s data needs is NoSQL. This type of database is different in […]
Nakivo Backup and Replication VMware EXPLORE 2023
Nakivo Backup and Replication is present during VMware Explore 2023 in Barcelona here. I’m by the booth to ask a few questions about the latest Nakivo development and see how the software is able to help you fight ransomware with its built-in Malware detection. Photo from VMware EXPLORE Barcelona 2023 at the Nakivo Booth with […]
Runecast Platform 6.8 and VMware EXPLORE Barcelona 2023
Over the past couple of years, the importance of security and compliance has become even more important than performance or best practices. The reason is that organizations of all sizes are not prepared enough for ransomware attacks, without a proper plan of what to do when they’re hit, or who is responsible for what. Also, […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- 6
- …
- 21
- Next Page »