CloudBerry Backup VM edition by default comes with two processor socket licenses included, meaning that you can only backup your virtual machines from tte hypervisor that has no more than two physical processors. If your hypervisor incorporates three or more physical processors, you'll have to purchase an extra processor socket license for each processor. In this article we will explain how to purchase said socket licenses and attach them to your main CloudBerry Backup VM edition license.
If you’ve already decided to start an MSP business, then you’ve made the right choice. The current market for IT managed service providers is constantly growing with more and more opportunities arising every single day.
That said, using an online backup service as an MSP is hands down one of the best ways to provide quality service to your clientele. That’s because online backup services allow you to ardently secure your clients' data by keeping reserve copies of your clients’ critical files, folders, and hard drives on a remote server or in a cloud storage platform like Amazon S3 or Microsoft Azure. Perhaps more importantly, when a service provider offers backup-as-a-service to his clients, he/she can always help to restore that data whenever the client needs it.
Securely storing your customer's data to a preferred cloud provider has numerous advantages than simply backing up the data to a local storage location. Let's take a closer look at these benefits below. Continue reading
When most people hear “data storage,” they think about conventional file level storage. The storage solutions used by typical end users are file systems that are mapped to individual hard drives.
However, file systems are only one way to organize data. Another popular method -- and one that is particularly useful when setting up virtual machine storage, network attached storage and SAN storage -- is block storage.
This article defines block storage, discusses common block storage use cases and explains what makes block storage different from file level storage. Continue reading
Every day since the beginning of 2017 a whopping 4000 ransomware attacks occur every day. In this whitepaper, we’ll outline what your ransomware protection strategy should look like, highlighting the value of having a solid backup and recovery plan to ensure you can get the organization back into a state of operation as quickly as possible.
The Value of Backup
How does ransomware work? If you think that ransomware works in the same way as other types of cyberattacks, you may be overlooking important steps for protecting yourself against it.
Ransomware works differently from other malware threats. Traditional security tools like antivirus scanners and firewalls are of limited use against ransomware. To combat ransomware effectively, you need to understand the complex nature of different types of ransomware attacks, then create processes -- such as strategic data backups -- to protect yourself against ransomware. Tools alone won’t keep you safe.
This article helps you defend yourself against ransomware by assessing the current state of ransomware threats and discussing the latest developments in ransomware design. Continue reading
In our last article, we described the recent situation with many organizations were hit by the WannaCry strain of ransomware – and the possible ways of retaliation. In some cases, organizations simply chose to pay the ransom of $300 – a mere pittance compared to the value of lost data. But WannaCry was not ransomware targeting businesses; instead, it was focused on impacting individuals. Thus, the extremely low ransom. In many ways, organizations hit by WannaCry were lucky.
But the next ransomware variant may not be so nice.
In a perfect world, you would have an automated data backup and recovery solution in place for all of your data so that you never need to worry about losing data.
In the real world, however, you may sometimes experience data loss without having a data backup in place. For example, you may have a disk drive that begins to fail and contains data that is not backed up, or you may accidentally delete files that have not yet been written to a backup location.
Fortunately, it is sometimes possible to recover data in situations like this. Several free data recovery software can help you to restore data even from disks that are damaged, or after you have erased data from your file system.
This article provides an overview of free data recovery tools and explains what each one can do to help you recover data after a data loss. Continue reading
Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning. Continue reading
The main aspect of every backup and recovery strategy is a balance of RTO and RPO objectives. They regard how quickly and precisely you will be able to get the data back if something goes wrong. In case of disaster, recovery time objective becomes one of the most valuable characteristics in the business planning.