Get started
Bring yourself up to speed with our introductory content.
Get started
Bring yourself up to speed with our introductory content.
Get started with the Kopia backup tool
Backup applications have evolved for increased speed, flexibility and new storage locations. Open source tool Kopia is one option backup admins might consider. Continue Reading
RAID 5 vs. RAID 10
RAID is a staple for backup and storage administrators who want to create redundancy and protect data. RAID 5 and RAID 10 offer similar benefits, but is one better than the other? Continue Reading
How to improve backup performance
Achieving and maintaining optimal backup performance is a continuous process that requires a proactive approach to monitoring, analysis and optimization. Continue Reading
-
Increase backup efficiency with a data destruction policy
Data destruction policies are often rooted in security and storage capacity concerns, but reducing the overall amount of data can greatly improve the efficiency of backup jobs. Continue Reading
Backup strategy for small businesses 101
Small businesses must review data protection needs and choose a backup strategy accordingly. This ensures that they meet requirements without going over budget. Continue Reading
Get to know the archive bit and its role in data backup
Good data management is key to protecting critical files. A tool like the archive bit can help ensure backup administrators know what data needs to be backed up at a glance.Continue Reading
How to craft a cost-effective backup strategy
A cost-effective data backup plan requires IT teams to examine their data protection requirements and choose the right strategy that fits into what the business can spend.Continue Reading
Windows Server backup to the cloud: A step-by-step guide
Backups are critical when using Windows Server. While third-party cloud vendors offer protection, Windows Server admins can back up to Azure using only native Microsoft tools.Continue Reading
7 data backup strategies and best practices you need to know
This comprehensive guide explains backup basics, the issues affecting risk and the seven critical backup strategies you need to keep data safe.Continue Reading
How to create Group Policy backups in Windows Server
Group Policy Objects represent a significant time investment and an important configuration management tool. Follow these simple steps to protect them.Continue Reading
-
How to back up a Windows DHCP server
The Windows DHCP server creates an automatic local backup of its configuration regularly, but Windows Server admins can configure a stronger backup with this tutorial.Continue Reading
3-2-1 backup strategy explained: Is it effective?
The 3-2-1 backup is a time-tested data protection and recovery methodology for ensuring that data is protected adequately and up-to-date backup copies of the data are available when needed.Continue Reading
How to use the Windows Server Backup tool
In this tutorial you'll learn how to install, schedule and test Windows Server Backup utility. Readers will also find out which environments the tool is best suited to.Continue Reading
differential backup
A differential backup is a data backup that copies all the files that have changed since the last full backup was performed.Continue Reading
Agent vs. agentless backup: Which is the best option?
In the debate between agent-based and agentless backups, agentless tends to win out. However, factors such as environment and hypervisor capabilities can impact that decision.Continue Reading
LTO-8 (Linear Tape-Open 8)
LTO-8, or Linear Tape-Open 8, is a tape format from the Linear Tape-Open Consortium released in late 2017. It succeeded the LTO-7 version, which launched in 2015.Continue Reading
Druva
Druva is a cloud data protection and management software company based in Sunnyvale, Calif.Continue Reading
Digital Personal Data Protection Act, 2023
India's Digital Personal Data Protection Act, 2023 (DPDPA) is a comprehensive privacy and data protection law that recognizes the right of individuals, referred to as "data principals," to protect their personal data during the processing of that ...Continue Reading
purpose-built backup appliance (PBBA)
A purpose-built backup appliance (PBBA) is a standalone disk-based storage device that is configured and optimized for storing backup data.Continue Reading
data protection authorities
Data protection authorities (DPAs) are public authorities responsible for enforcing data protection laws and regulations within a specific jurisdiction.Continue Reading
data anonymization
Data anonymization describes various techniques to remove or block data containing personally identifiable information (PII).Continue Reading
Veeam Backup & Replication
Veeam Backup & Replication is a software product developed by Veeam Software to back up, restore and replicate data on virtual machines (VMs).Continue Reading
Develop a backup KPI to improve performance
Key performance indicators help ensure that IT teams meet the needs of the business. A backup KPI demonstrates effective data protection to both customers and management.Continue Reading
incremental backup
An incremental backup is a backup type that only copies data that has been changed or created since the previous backup activity was conducted.Continue Reading
LTO-9 (Linear Tape-Open 9)
LTO-9 is a tape format from the Linear Tape-Open (LTO) Consortium. It launched in 2021.Continue Reading
LTO-7 (Linear Tape-Open 7)
LTO-7 is a tape format from the Linear Tape-Open (LTO) Consortium released in late 2015. It succeeded the LTO-6 version, which launched in 2012.Continue Reading
Linear Tape-Open (LTO)
Linear Tape-Open (LTO) is an open-format tape storage technology created by HPE, IBM and Seagate Technology.Continue Reading
data processing
Data processing refers to essential operations executed on raw data to transform the information into a useful format or structure that provides valuable insights to a user or organization.Continue Reading
Data protection vs. security vs. privacy: Key differences
Data protection, privacy and security might look alike but their differences can make or break a comprehensive compliance program to collect, manage, access, erase and secure data.Continue Reading
data protection as a service (DPaaS)
Data protection as a service (DPaaS) involves managed services that safeguard an organization's data.Continue Reading
Data Protection Act 2018 (DPA 2018)
The Data Protection Act 2018 (DPA 2018) is a legislative framework in the United Kingdom governing the processing of personal data.Continue Reading
backup storage device
A backup storage device is a hardware component for storing copies of data.Continue Reading
data minimization
Data minimization aims to reduce the amount of collected data to only include necessary information for a specific purpose.Continue Reading
11 core elements of a successful data protection strategy
Your organization's data protection strategy might not include all 11 core elements and associated activities, but the important thing is to have a comprehensive strategy in place.Continue Reading
removable media
Removable media is any type of storage device that can be removed from a computer while the system is running. Removable media makes it easy for a user to move data from one computer to another.Continue Reading
off-site backup
Off-site backup is a method of backing up data to a remote server or to media that's transported off-site.Continue Reading
asynchronous replication
Asynchronous replication is a store-and-forward approach to data backup and protection.Continue Reading
data retention policy
In business settings, data retention is a concept that encompasses all processes for storing and preserving data, as well as the specific time periods and policies businesses enforce that determine how and for how long data should be retained.Continue Reading
ghost imaging (disk imaging)
In computing, ghost imaging, also called disk imaging, is a data backup process that creates an image of a computer's hard disk drive (HDD), solid-state drive (SSD) or one of the drive's partitions.Continue Reading
storage snapshot
A storage snapshot is a set of reference markers for data at a particular point in time (PIT). More specifically, it's a collection of saved application data and a comprehensive log that details how the saved data has changed over time.Continue Reading
data deduplication hardware
Data deduplication hardware is disk storage that eliminates redundant copies of data and retains one instance to be stored.Continue Reading
data loss
Data loss is the intentional or unintentional destruction of information.Continue Reading
encryption key management
Encryption key management is the practice of generating, organizing, protecting, storing, backing up and distributing encryption keys.Continue Reading
hybrid backup
A hybrid backup is typically when organizations use both on-premises storage and the public cloud as data backup destinations, depending on specific requirements and use cases.Continue Reading
data protection management (DPM)
Data protection management (DPM) is the administration, monitoring and management of backup processes to ensure backup tasks run on schedule and data is securely backed up and recoverable.Continue Reading
Tutorial: Use Linux rsync backup to protect files
Rsync is a file transfer utility designed to move data from one Linux network host to another, which has made it a popular option for backing up critical data.Continue Reading
Tutorial: How to use Linux Deja Dup to back up and restore files
Deja Dup isn't advertised as a backup tool, but that doesn't mean you can't use it for data protection. Find out how to use Linux Deja Dup for backup and restore in this tutorial.Continue Reading
Tutorial: Use Linux cpio to back up and restore files
There are many ways of backing up files on Linux devices. The cpio utility copies contents out of the file system and into an archive to create reliable backups.Continue Reading
Dump and restore: Helpful backup utilities for Linux users
Dump and restore are two Linux utilities that help ensure reliable backups. From utility installation to restoring file systems, this tutorial is for Linux users of all levels.Continue Reading
magnetic tape storage
Magnetic tape is one of the oldest technologies for electronic data storage.Continue Reading
tape backup
Tape backup is the practice of periodically copying data from a primary storage device to a tape cartridge.Continue Reading
cold backup (offline backup)
A cold backup is a backup of an offline database.Continue Reading
How often should you back up your data? Answers vary
Backup strategy and frequency is unique for just about every organization. You must balance backup management abilities with the amount of loss your business can tolerate.Continue Reading
data archiving
Data archiving moves data that is no longer actively used to a separate storage device for long-term retention.Continue Reading
data reduction
Data reduction lowers the amount of capacity required to store data.Continue Reading
Oracle RMAN tutorial: Get started with database backup
In this tutorial, find out how to use Oracle RMAN for different types of database backups and learn which commands admins must know to get the most out of the tool.Continue Reading
data restore
Data restore is the process of copying backup data from secondary storage and restoring it to its original location or a new location.Continue Reading
How the 3-2-1-1-0 backup rule reflects modern needs
The 3-2-1-1-0 backup rule addresses modern data protection requirements, such as ransomware protection and cloud backup. Find out how it builds on the 3-2-1 rule in this tip.Continue Reading
tape library
In data storage, a tape library is a collection of magnetic tape cartridges and tape drives.Continue Reading
backup as a service (BaaS)
Backup as a service (BaaS) is an approach to backing up data that involves purchasing backup and recovery services from an online data backup provider.Continue Reading
What is cloud backup and how does it work?
Cloud backup, also known as online backup or remote backup, is a strategy for sending a copy of a physical or virtual file or database to a secondary, off-site location for preservation in case of equipment failure, site catastrophe or human ...Continue Reading
Cloud-to-Cloud Backup (C2C Backup)
C2C backup (cloud-to-cloud backup) is the practice of copying data stored on one cloud service to another cloud service. The backup stored on the second cloud service serves the same purpose as an off-site backup.Continue Reading
Full vs. incremental vs. differential: Comparing backup types
Evaluate full vs. incremental vs. differential backup, as well as newer types of backup, in synthetic and incremental-forever, to determine what's best for your organization.Continue Reading
image-based backup
Image-based backup creates a copy of an operating system and all the data associated with it, including the system state and application configurations.Continue Reading
RAID data protection quiz: Test your knowledge
How well do you know RAID? It may be time to test your know-how. Find out how much you know about RAID levels, origins and their relationship to data backup with this quiz.Continue Reading
What are some SAP HANA backup options available today?
When backing up SAP HANA databases, having the right tools for the organization is critical. Data snapshots are one option, but not the only one available.Continue Reading
Storage media showdown: The benefits of tape vs. disk backup
Tape and disk are established as reliable backup storage, but which one is best for your organization? Consider factors such as cost, performance and security in your decision.Continue Reading
What is data vaulting and how does it shape modern backups?
Data vaulting methods, such as air gapping and active archives, help isolate and protect data backups from malicious deletion or accidental data loss.Continue Reading
Box backup tips, options and considerations
Backing up Box data? Look at your organization's retention policies, compliance requirements and complementary tools to form a solid Box backup strategy.Continue Reading
How to restore a Kubernetes cluster from an etcd snapshot
In case of an event that leads to the loss of a Kubernetes cluster, it's important to be restore-ready. Here's how to restore a cluster from an etcd snapshot with commands.Continue Reading
How to use air gaps for ransomware defense
Air gaps can be a valuable last line of defense against ransomware. However, both logical and physical air gaps have vulnerabilities that can be exploited by bad actors.Continue Reading
Backup scheduling best practices to ensure availability
For daily work files, databases and mission-critical systems and data, the more frequent the backup, the better. But how often should you back up all your data?Continue Reading
Test your knowledge of ransomware backup best practices
New ransomware that specifically targets backups can make it difficult to ensure data is safe. Take our quiz to test your knowledge about ransomware backup.Continue Reading
Enterprise backup-as-a-service options, benefits and use cases
The rise of cloud has broadened the market for backup as a service in recent years. We cover the benefits of enterprise BaaS and prominent providers in this guide.Continue Reading
How to keep up with IoT data protection
When it comes to protecting IoT data, admins can begin planning backup with an assessment of how much data the organization is generating and how it's being used.Continue Reading
Which backup standards guide a data protection strategy?
A strong data protection strategy must follow applicable standards and regulations to protect data and comply with privacy laws. What are some key standards to look out for?Continue Reading
Kubernetes backup demands new IT practices and tools
IT admins need to evolve their backup strategies to accommodate for the highly dynamic nature of Kubernetes environments -- and the right tool can go a long way.Continue Reading
Emphasize backup for container data protection
As container adoption continues to grow, admins have to rethink their data backup and protection strategies. Luckily, there are some best practices and tools that can help.Continue Reading
How to implement asynchronous replication in Apache Pulsar
David Kjerrumgaard explains how asynchronous replication works in Apache Pulsar for those still learning to use this platform as part of their data backup strategy.Continue Reading
What does your backup and recovery audit checklist need?
This backup and recovery audit checklist offers a comprehensive group of controls and evidence examples to get you ready for the important process of IT auditing.Continue Reading
Transition to modern backup strategy for a refresh
Time takes its toll on both data and backup technologies. Careful planning and preparation can keep enterprise data intact and accessible for many years to come.Continue Reading
Download a backup testing checklist to stay prepared
How can you be sure a backup will be successful if you don't test it? Use this backup testing checklist to confirm such important steps as timing and detection of any anomalies.Continue Reading
How can I best implement an active archive environment?
Examine the major elements of an active archiving environment, including the kinds of data that you can use in one and resources to help with platform execution.Continue Reading
Enterprise backup as a service explained
Enterprise BaaS is a software as a service that delivers backup and recovery services that connect systems to the cloud. Learn how BaaS works, pros and cons, and best practices.Continue Reading
2 important edge data storage backup best practices
Edge data storage backup has become a key component of data protection plans. File sync-and-share software can complement this important backup process.Continue Reading
Post-pandemic data backup and recovery planning guidelines
Following the coronavirus pandemic, you might have to modify your backup and recovery strategy. Overcome the data protection challenges presented by the changes in daily life.Continue Reading
What are Microsoft Teams backup and recovery best practices?
Backup and recovery of Microsoft Teams is often a complex process. Explore these guidelines to help simplify the important protection of your Teams data.Continue Reading
The importance of data backup policies and what to include
It's important to document your data backup and recovery policy. Take the first step and download our template and use this structure for developing other IT policies.Continue Reading
Backup training for general IT admins in the wake of COVID-19
In addition to the resources already available within a typical IT department, many external resources are available for all kinds of IT training requirements.Continue Reading
3 backup-as-a-service benefits for remote workers
When employees are dispersed, data backups need to move off site, too. Here's why organizations should consider using backup as a service in these tumultuous times.Continue Reading
Enterprise backup as a service protects data for remote users
Discover the advantages of backup as a service for your various workloads, as well as some of the challenges users might encounter with the technology.Continue Reading
What are 5 top Microsoft 365 backup considerations?
SaaS application backup is increasingly prevalent, and for good reason -- it's critical for ensuring data protection. These five guidelines will help you protect Microsoft 365.Continue Reading
Data backup plan template: A free download and guide
Download our free backup planning template to help you get started or improve your current plan. It's important to have critical information laid out in a document.Continue Reading
7 remote data backup terms for protection during a pandemic
In this glossary, you'll find important background information on remote backup. It's crucial to think about everything from network connections to backup devices and sites.Continue Reading
Remote office backup best practices and options
How can organizations ensure backup of data generated from employees' remote offices? Explore two top options and guidance to help protect your critical data.Continue Reading
How has backup as a service evolved and improved?
The backup-as-a-service platform is a popular use of cloud-based infrastructure. With new products and features launching, it's important to plan out your BaaS environment.Continue Reading
Achieving backup compliance among CCPA and other regulations
The recently enacted CCPA is just one of many current and potential regulations that backup administrators need to understand. Here are a few guidelines for staying compliant.Continue Reading
5 important Docker container backup best practices
With container storage a major trend, it's important to ensure data protection. These five guidelines will help you properly back up Docker containers.Continue Reading
How to handle data management in the cloud
Managing data in the cloud can result in cost and management complexities. But you can also use the technology to get a deeper understanding of your data.Continue Reading
Why is a data archive plan important?
A data archiving plan might not be simply important for your organization -- it could be necessary, given legal and compliance requirements. Make sure you're ahead of the game.Continue Reading