With more stateful cloud-native applications deployed on Kubernetes clusters, the volume of data that needs to be protected has grown exponentially. The issue is that traditional approaches to backup and recovery don’t easily lend themselves to a platform that is managed using DevOps workflows. Data protection needs to evolve to ensure availability of cloud-native applications running across highly distributed IT environments.

With the acceleration of hybrid cloud adoption and digital transformation initiatives, data is in more places than ever. From containers and on-premises environments to cloud and SaaS-based applications, businesses need a smart strategy to protect their entire data estate from today’s threats. And while native tools provide businesses with high availability, they are not enough. In this session, Metallic’s CTO David Ngo unpacks the critical need for dedicated data protection, the advantages of purpose-built solutions and how Metallic DMaaS safeguards data from deletion, corruption and ransomware attacks no matter where your data lives.

Modern object storage has taken center stage for enterprises. Its performance characteristics, its inherent immutability and its infinite scalability make it the primary, secondary and tertiary storage of choice for endpoints across a broad range of use cases.

Backup and restore is one of those use cases and, as data security continues to be one the most important decisions a data architect can make, the release of Veeam 12 could not be more timely. In this release, object storage is now available in the performance tier and the implications are significant.

Join MinIO and Veeam to learn:

  • Why backup strategies and architectures have shifted to high-performance object storage
  • How to leverage MinIO’s industry-leading performance and scalability when designing backup solutions using Veeam
  • How to configure MinIO and Veeam to maximize the benefits of both in your environment
  • The one thing customers fail to consider when architecting and testing their systems
  • The webinar will include a hands-on demonstration of Veeam 12 working with MinIO
  • The importance of an end-to-end plan, it is not just backup, it also includes restore
  • Why performance matters more than you think in BU/DR use cases
  • Why Veeam making object storage a first class citizen and what it means more broadly

We’ve learned a lot from the failure of companies to stay on top of data privacy and security and from their responses. It’s not just about the failure of any single company, but those whose responses inspired admiration and that others tried to emulate.

Some learned the hard way and were forced to take data privacy and security more seriously after security-related incidents. They learned to build short- and long-term plans for better security. Basic core components for data privacy and security can be applied to new use cases and platforms when a new need arises.

Some companies learned these lessons by watching others in their industry before they experienced any major security incident; implementing best practices with granular data privacy and security to achieve a more defensible security posture. They assumed that an attacker might soon target their business or might already be in their systems. The major lesson: The security landscape is increasingly changing and needs to be continuously monitored to stay ahead of threats.

View Webinar

Secure access to sensitive corporate systems and data is among the highest priorities for IT and security teams. While corporations have invested millions to ensure that access to these systems and data is done securely through the use of identity and access management (IAM), privileged access management (PAM) and, more recently, conditional access and zero-trust approaches, the threat of accessing these systems from a compromised device continues to pose a significant risk to corporations.

Some organizations have gone to the extreme of providing their privileged users with an additional device solely for the purpose of accessing sensitive systems and data and others are actively seeking methods to ensure that access to such systems is performed from a clean environment.

In this webinar, we will cover:

  • The risks from a hybrid workforce of employees and contractors working outside of the corporate firewall and engaging in both risky activities and sensitive corporate tasks on the same device.
  • Current secure access solutions and how they neglect to secure the endpoint.
  • How to secure endpoint access to corporate applications without increasing user frustration and shadow IT practices
View Webinar