fbpx

Our Blog

Stay in-the-know with all things storage & backup security,
vulnerability management, and ransomware protection

Continuity Joins Dell Technologies ETC Program to Help Protect Customers’ Storage and Data Protection Systems

Continuity Joins Dell Technologies ETC Program to Help Protect Customers’ Storage and Data Protection Systems

The ETC Program underscores Dell’s commitment to offer customers flexibility and choice with complimentary solutions such as StorageGuard for protecting their critical systems from cyberattacks and…
Read more
Business Continuity Report

The One Report Every Business Continuity Manager is Asking For

What would the report that every IT infrastructure and business continuity manager include? Check out this sample report and learn how you can get important information such as business services at risk, replication status, configuration gaps, and IT response time in one single report.

Read more
Enterprise Service Availability Benchmarks

Enterprise Service Availability & Business Continuity Benchmarks

Read the following survey and learn how your service availability metrics and disaster recovery practices compare to your industry.

Read more
It downtime risk

Another Hidden Downtime Risk That Can Come Back to Bite You

Today’s Topic: Cluster Shared SAN Configuration Drift The most common way to share data between cluster nodes is through the use of multi-homed SAN storage. Inconsistent

Read more
Hidden recovery risks

Hidden Recovery Risk That Will Come Back to Bite You

Today’s Hidden Risk: Invalid Database Snapshot An invalid database copy can be created when a storage-based snapshot (or any other type of copy, such as replica,

Read more

What is Configuration Drift?

Configuration drift is a data center environment term. At a high level, configuration drift happens when production or primary hardware and software infrastructure configurations “drift” or become different in some way from a recovery or secondary configuration or visa versa. Production or primary and recovery or secondary configurations are designed to be identical in certain aspects is order for business resumption should there be a disaster or major failure in production. When these infrastructure configurations drift from another, they leave a gap between them which commonly called a configuration gap.

Read more

Talk To An Expert

Get in touch to see how you can detect, prioritize, and fix all security risks in your storage & backup systems.

Join Our 10-Minute Quick Demo - Wednesday, April 19th at 12 PM ET

Register
We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree