Overview
Explore
Labs
Services
Events
Partners
Select a tab
27 results found
Setting RPO and RTO Based on Risk
Assigning RPO (Recovery Point Objective) and RTO (Recovery Time Objective) based on risk analysis ensures optimal data protection and business continuity. Critical systems require shorter RPO and RTO, balancing cost and risk. This strategic approach minimizes downtime and data loss, safeguarding operations against disasters and cyber threats.
Blog
• Feb 20, 2025
Commvault and Dell PowerProtect DD - Better Together
Commvault and Dell Technologies have partnered to provide customers with enhanced, API level integration between Commvault's Backup & Recovery software and Dell's data protection storage hardware products. Commvault is integrating Dell DD Boost backup protocol into their software stack, allowing Commvault users to write directly to Dell PowerProtect DD (PPDD) series appliances using the appliances' native protocol.
Blog
• Jun 11, 2024
Veritas Flex Appliance and InfoScale Proof of Concept
Every business should have reliable, scalable data protection and disaster recovery solutions that allow them to reduce risk, eliminate uncertainty and maintain control of their environment. If you are searching for answers to these challenges, look no further than Veritas Flex Appliances with NetBackup for enterprise data protection and Veritas InfoScale for high-availability disaster recovery for critical applications.
Blog
• Aug 19, 2024
Preparing for DORA Compliance with Pure Storage and Commvault?
WWT's take on the new DORA compliance joint solution brief from Pure Storage and Commvault that aims to help customers meet requirements and will aid in your cyber resiliency plan.
Blog
• Dec 10, 2024
The Time for Post Quantum Encryption is Now, Not Later
This post is not comprehensive of all encryption and data security practices, but it highlights the impending necessity for post-quantum cryptography adoption. We will take a brief look at why this is a current concern, who has this technology today and why we need to start adoption soon.
Blog
• Nov 11, 2024
Veritas Alta Data Protection Powered by Cloud Scale Technology
Many clients are and have been moving to cloud service providers to take advantage of the flexibility and scalability that they offer. As IT evolves and adopts these new cloud technologies and platforms it becomes critical that the data protection strategy being used for cloud assets is equally versatile.
Blog
• Dec 17, 2023
Assessing Good Data Loss Prevention with SSE
In a world of escalating cyber threats, effective Data Loss Prevention (DLP) is crucial. Secure Service Edge (SSE) solutions offer integrated DLP capabilities, enhancing data protection across networks, endpoints and cloud environments. Understanding and implementing "good" DLP practices ensures robust data security and compliance, evolving with organizational needs.
Blog
• Nov 21, 2024
Secure All Together – Think About "The 3 R's"
In today's digital age, it is crucial to prioritize cybersecurity and focus on the three key areas of risk, resilience and recovery. By evaluating and mitigating risks, building resilience and having a well-defined recovery plan, organizations can enhance their security and ensure business continuity. Collaboration and embracing these principles can create a safer digital world.
Blog
• Aug 8, 2024
F5 Distributed Cloud L7 DDoS Mitigation
Learn how to use F5 Distributed Cloud to protect your applications from DDoS attacks.
Blog
• Jun 13, 2024
Cyber Resilience - A Holistic Approach
A holistic approach to a cyber resilience program is essential, emphasizing both recovery and cybersecurity posture to minimize the impact and reduce the recovery scope after a cyber event.
Blog
• Aug 14, 2024
Rubrik Zero Labs Report 4: "Measuring Your Data's Risk"
Rubrik Zero Labs' report, "Measuring Your Data's Risk," addresses data security challenges in healthcare, emphasizing risk mitigation and the importance of backups in resilience against ransomware attacks.
Blog
• May 2, 2024
Immutable Backup Strategy and the Journey to Cyber Resilience
Immutable backups are a key part of data protection strategy, cyber vaults, and the acceleration to mature cyber resilience.
Blog
• Jun 3, 2024