Author Archives: Denis G

Brick-Level Mailbox Backup Explanation

Exchange Server brick-level backup means backing up the smallest available information objects (mailbox items), and there are a few things you should know about these “bricks”.

In this article, we are going to explain the different Exchange backup approaches and show you how to perform a granular restore using CloudBerry software for MS Exchange backup. Continue reading

Amazon S3 Security In-Depth Part 3: IAM Identities

This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading

Amazon S3 Security In-Depth Part 2: Basics of IAM Policies

This is the second in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In this Part II, we will take a deeper look at managing access to your S3 resources using AWS Identity and Access Management (IAM). Continue reading

MS SQL Server Backup Automation

SQL backup routine includes various actions you should remember about. And the best way to get it done is by using backup automation. In this article, we will cover built-in tools that help to simplify your daily routine.

We will also show how to do this using CloudBerry software for MS SQL Server backup. Continue reading

SQL Server Table-Level Backup Guide

It is time to overview table-level backup - one of the most rarely used data protection types. You may need to copy data into one single table in case of data export or migration or as part of a disaster recovery plan.

In this article, you will find out about how to back up a table in SQL Server and what you need to remember. Continue reading

Amazon S3 Security In-Depth Part 1: ACLs vs Bucket Policies vs IAM

To use Amazon S3 effectively, you need to be aware of the security mechanisms provided by AWS to control your S3 resources. This is the first part in a three-part series on S3 security. In this part, we will discuss the three different access control tools provided by AWS to manage your S3 resources. Continue reading