Our Blog

Stay in-the-know with all things storage & backup security,
vulnerability management, and ransomware protection

Locking Down Backups: Strengthening Security Posture Against Cyber Threats

Locking Down Backups: Strengthening Security Posture Against Cyber Threats

Backup security is no longer just about ensuring data availability—it has become a frontline defense against attackers who increasingly view backup systems as high-value targets.   While
Read more
IT infrastructure threats

The Top 10 Cluster Availability Risks

In a complex cluster setup, it is practically impossible to ensure 100% availability across all IT layers. The ongoing changes inevitably result in configuration inconsistencies, introducing availability risks that often remain hidden until disaster strikes. Detecting those risks ahead of time, can prevent the next costly outage.

Read more
spookiest IT infrastructure threats

The Spookiest IT Infrastructure Threats

What are the scariest IT scenarios that can bring down your IT infrastructure? Naturally, one would think about disasters such as hurricanes, fire, or maybe cyber-attacks. But the actual threats to your critical systems may surprise you – and you can actually have control over them, given the right tools and processes.

Read more
Business Continuity Report

The One Report Every Business Continuity Manager is Asking For

What would the report that every IT infrastructure and business continuity manager include? Check out this sample report and learn how you can get important information such as business services at risk, replication status, configuration gaps, and IT response time in one single report.

Read more
Enterprise Service Availability Benchmarks

Enterprise Service Availability & Business Continuity Benchmarks

Read the following survey and learn how your service availability metrics and disaster recovery practices compare to your industry.

Read more
It downtime risk

Another Hidden Downtime Risk That Can Come Back to Bite You

Today’s Topic: Cluster Shared SAN Configuration Drift The most common way to share data between cluster nodes is through the use of multi-homed SAN storage. Inconsistent

Read more
Hidden recovery risks

Hidden Recovery Risk That Will Come Back to Bite You

Today’s Hidden Risk: Invalid Database Snapshot An invalid database copy can be created when a storage-based snapshot (or any other type of copy, such as replica,

Read more

What is Configuration Drift?

Configuration drift is a data center environment term. At a high level, configuration drift happens when production or primary hardware and software infrastructure configurations “drift” or become different in some way from a recovery or secondary configuration or visa versa. Production or primary and recovery or secondary configurations are designed to be identical in certain aspects is order for business resumption should there be a disaster or major failure in production. When these infrastructure configurations drift from another, they leave a gap between them which commonly called a configuration gap.

Read more

Talk To An Expert

It’s time to automate the secure configuration of your storage & backup systems.

One Power-Packed Virtual Panel. Eight Cybersecurity Experts. Join us on April 3

Register
We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree