Overview
Explore
Labs
Services
Events
Partners
Select a tab
30 results found
Doomsday Prep: How to Keep Your Business Alive During a Ransomware Attack
With 88 percent of organizations facing at least one ransomware attack annually, the focus must shift from just prevention to survival.
The solution: Minimum Viable Recovery (MVR) — a practical approach to recovering just enough to keep the business running. This is about achieving Minimum Viable Business, not full restoration.
Blog
•Apr 30, 2025
Commvault's New Directions and Announcements at SHIFT Event
Commvault's 'SHIFT' event unveiled a transformative approach to data protection, emphasizing continuous business resilience, AI-driven security and multicloud flexibility. Addressing cyber threats and compliance, the event highlighted the necessity of understanding business infrastructure for robust data management. Commvault's innovations promise to redefine the security landscape.
Blog
•May 7, 2025
Commvault and Dell PowerProtect DD - Better Together
Commvault and Dell Technologies have partnered to provide customers with enhanced, API level integration between Commvault's Backup & Recovery software and Dell's data protection storage hardware products. Commvault is integrating Dell DD Boost backup protocol into their software stack, allowing Commvault users to write directly to Dell PowerProtect DD (PPDD) series appliances using the appliances' native protocol.
Blog
•Jun 11, 2024
Setting RPO and RTO Based on Risk
Assigning RPO (Recovery Point Objective) and RTO (Recovery Time Objective) based on risk analysis ensures optimal data protection and business continuity. Critical systems require shorter RPO and RTO, balancing cost and risk. This strategic approach minimizes downtime and data loss, safeguarding operations against disasters and cyber threats.
Blog
•Feb 20, 2025
Thoughts on Backup Retention
Learn more about the merits of keeping backup retention as short as needed to provide recovery ability and keep solutions cost low.
Blog
•Jul 1, 2024
Thoughts on Breaking Glass (in Case of Emergency) for Backup Systems
In a world of escalating cyber threats, the "break glass" account emerges as a crucial lifeline, enabling emergency access to backup systems when standard authentication fails. This strategy ensures business continuity and data recovery, safeguarding against catastrophic losses even when Identity and Access Management systems are compromised.
Blog
•Apr 16, 2025
The Time for Post Quantum Encryption is Now, Not Later
This post is not comprehensive of all encryption and data security practices, but it highlights the impending necessity for post-quantum cryptography adoption. We will take a brief look at why this is a current concern, who has this technology today and why we need to start adoption soon.
Blog
•Nov 11, 2024
Immutable Backup Strategy and the Journey to Cyber Resilience
Immutable backups are a key part of data protection strategy, cyber vaults, and the acceleration to mature cyber resilience.
Blog
•Jun 3, 2024
Preparing for DORA Compliance with Pure Storage and Commvault?
WWT's take on the new DORA compliance joint solution brief from Pure Storage and Commvault that aims to help customers meet requirements and will aid in your cyber resiliency plan.
Blog
•Dec 10, 2024
Veritas Flex Appliance and InfoScale Proof of Concept
Every business should have reliable, scalable data protection and disaster recovery solutions that allow them to reduce risk, eliminate uncertainty and maintain control of their environment. If you are searching for answers to these challenges, look no further than Veritas Flex Appliances with NetBackup for enterprise data protection and Veritas InfoScale for high-availability disaster recovery for critical applications.
Blog
•Aug 19, 2024
Veritas Alta Data Protection Powered by Cloud Scale Technology
Many clients are and have been moving to cloud service providers to take advantage of the flexibility and scalability that they offer. As IT evolves and adopts these new cloud technologies and platforms it becomes critical that the data protection strategy being used for cloud assets is equally versatile.
Blog
•Dec 17, 2023
Thoughts on Kubernetes Data Protection
Kubernetes was created by Google in 2014 and donated to the Cloud Native Computing Foundation (CNCF) in 2015. It has become the de facto standard for running containers in production at scale.
Blog
•Aug 11, 2023