Archív bielych kníh

Najnovšie témy:

Data Migration With Nasuni

Part of any organization’s journey to the cloud includes migrating data. Nasuni’s Data Migration Services are the pathway to an implementation that eliminates risk, accelerates value, and is elementary to the success of our cus...

Zobraziť el. knihu

Nasuni Multi-Site Collaboration

Powered by intelligent data propagation and global file locking to avoid version conflict, the Nasuni’s MultiSite Collaboration add-on service takes collaboration to the next level. Complete with Global File Lock and Global Fil...

Zobraziť el. knihu

DEMO: Microsoft Teams Backup

Although Teams data has its own basic retention, Microsoft doesn’t fully protect against accidental deletion or security threats that lead to data loss, nor does it enable long-term retention for compliance or regulatory purpos...

Pozrieť si webinár na vyžiadanie

VIDEO: Veeam Backup for Microsoft Office 365 – Best Practices

Watch this free technical product demo to get an in depth look into the best practices for using the Veeam® Backup for Microsoft 365. In this demo, a Veeam Technologist will cover: The architecture and its components Storage ...

Pozrieť si webinár na vyžiadanie

What’s NEW in Veeam Backup for Microsoft 365 v7

Check out NEW Veeam® Backup for Microsoft 365 v7 in action in this live webinar. Version 7 helps you keep data out of reach of ransomware attacks, maintain full visibility of your Microsoft 365 backup environment and allows ten...

Pozrieť si webinár na vyžiadanie

DEMO: Immutable Microsoft 365 Data

According to ESG, 53% of surveyed organizations stated that they experienced data loss in their SaaS applications over the last 12 months. Make sure you’re not one of them! Watch FREE technical demos and learn how to: Creat...

Pozrieť si webinár na vyžiadanie

Operational Technology (OT) Cybersecurity Assessment

For many years, industrial systems relied upon proprietary protocols and software. These legacy solutions lacked automation, required manual administration by people, and had no external connectivity. Today, the operational te...

Zobraziť bielu knihu

Address the NIS2 Directive with Privileged Access Management

The Network and Information Security (NIS) Directive, created in 2016, was the first EU-wide cybersecurity law. Its objective was to achieve a higher and more uniform level of security for network and information systems throug...

Zobraziť bielu knihu

Understanding the TSA Code of Practice and How BeyondTrust Can Help

Even those outside of the telecommunications world will have heard of the government’s instruction to remove providers such as Huawei from UK communications networks. What you may not know is that this forms part of a much broa...

Zobraziť bielu knihu

Cybersecurity Insurance Checklist

The blistering pace and expanding scope of cyber threats and ransomware attacks is forcing cyber insurance companies to steeply increase their rates and premiums, and even drop coverage for high-risk organizations. Underwriting...

Zobraziť kontrolný zoznam
Zaregistrujte sa na odber nášho newslettera
Najdôležitejšie novinky zadarmo prostredníctvom e-mailu