Yaniv Valik

VP Product Management at Continuity Software

StorageGuard now enables automatic storage security risk remediation and change tracking

StorageGuard provides continuous storage system security configuration change tracking and facilitates automated healing of storage security risks

Read more

Misconfigurations Lead to a Lawsuit

BB&T Bank and Hitachi: Which company is responsible for the actions or inactions that led to BB&T’s February 2018 outage?

Read more

SEC Alerts Financial Firms to Risks Associated with Storage Practices for Sensitive Data

Security features insufficient; misconfigurations, maintenance and change practices must be addressed. (Data Security Advisor™ can help here!)

Read more

Container Technology + Container Orchestration ≠ Resilience

Container technology has brought many important benefits to enterprise IT but resilience is not one of them

Read more

Cyber-resilience: A Critical Component of Any Comprehensive Cyber-security Strategy

To keep core data systems safe, architect IT environments that shield critical data from attack

Read more

A What-if Analysis That Prevents Unplanned Maintenance-Related Outages

Enterprises with large and complex IT environments typically add and decommission numerous systems during an average week. From time to time, the unfortunate end result is an unplanned service outage. AvailabilityGuard What-If Impact Analysis report enables you to review the business processes that will be affected by decommissioning a switch.

Read more

How to meet regulatory expectations for cyber resilience

ECB claims that “financial market infrastructures should be designed to enable it to resume critical operations rapidly, safely and with accurate data”. How can you make sure you meet these new regulatory expectations?

Read more
Enterprise Service Availability Benchmarks

Enterprise Service Availability & Business Continuity Benchmarks

Read the following survey and learn how your service availability metrics and disaster recovery practices compare to your industry.

Read more
It downtime risk

Another Hidden Downtime Risk That Can Come Back to Bite You

Today’s Topic: Cluster Shared SAN Configuration Drift The most common way to share data between cluster nodes is through the use of multi-homed SAN storage. Inconsistent

Read more
Hidden recovery risks

Hidden Recovery Risk That Will Come Back to Bite You

Today’s Hidden Risk: Invalid Database Snapshot An invalid database copy can be created when a storage-based snapshot (or any other type of copy, such as replica,

Read more

Talk To An Expert

It’s time to automate the secure configuration of your storage & backup systems.

We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree

Welcome — Continuity is now Core6 !

Our name has changed, but our products, team, and commitment to customers remain the same.
You can now find us at www.core6.com.

Continue to Core6