Hot Technology for the Agile Enterprise

Derek Kol

Subscribe to Derek Kol: eMailAlertsEmail Alerts
Get Derek Kol via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Derek Kol

Author:  Courtenay Troxel, Zetta.net With wild fires and extreme heat ravaging California, the central states pounded by damaging thunderstorms and tornados, and hurricane season just on the horizon, the possibility that your company could be impacted by a natural disaster should be top of mind. Even companies that do have disaster recovery (DR) plans in place often don't do them justice. They neglect to review or update DR strategies to account for any changes in the business or they overlook the need to periodically test the plans to see if they hold up during unforeseen downtime. Taking this reactive approach to DR can have devastating repercussions. Just consider this alarming set of statistics: 43% of businesses that close as a result of a natural disaster never reopen. (Source: U.S. Congress) 30% of companies said they "are not at all confident" in their abilit... (more)

SHI Feeds SMBs' Appetite for Cloud Backup with Zetta.net

Author: Courtenay Troxel, Zetta.net With the cloud in its sights as a fast-track strategy for growth, SHI International Corp. has partnered with Zetta.net to round out its expanding portfolio with an enterprise-grade cloud backup and disaster recovery (DR) solution. SHI, which has transformed over the years from a $1 million "software-only" reseller into a $4 billion global provider of information technology products and services, says cloud offerings are crucial to attracting small- and medium-size businesses, which are constantly looking for ways to reduce cost, increase effi... (more)

Recovering from Cryptolocker with Cloud Backup

Author:  Nick Mueller, Zetta.net In September, a new type of trojan ransomware, CryptoLocker, started making the rounds by way of email attachments and links on infected webpages. It won't destroy anything on your computers, just encrypt the data so you the user can't access it. Once the files are encrypted, a screen pops up directing the user to pay a ransom of $100 to $300 (or two Bitcoins) within three days to regain access to the files. Beyond the 72-hour deadline, the ransom rises to 10 Bitcoins (About $3000). CryptoLocker itself is not difficult to remove, the damage comes f... (more)

NAS Cloud Backup: How It's Done

Author: Nick Mueller, Zetta.net Having Network Attached Storage (NAS) can be a lot simpler than backing up a large number of individual user machines, however, the rules for NAS cloud backup may be different then you're used to. Each NAS vendor has its own particular steps to follow. Here is how to back up NetApp devices with Zetta DataProtect. If you need to back up another type of NAS, contact Zetta.net. NetApp Backup Basics Zetta's NetApp backup works by reading a user generated configuration file which defines the data sources to back up and the appropriate login credentials ... (more)

Why Companies Need Enterprise Cloud Backup

Author:  Kiri Bowman, Business-Software.com Kiri Bowman of Business-Software.com speaks with with Vice President of Products Chris Schin and Chief Marketing Officer Gary Sevounts about how Zetta.net stands out from other enterprise cloud backup solutions. Tell me a little bit about Zetta.net. What business or IT challenge does your company solve? Gary: Zetta.net is an enterprise-grade backup and disaster recovery provider. We have been in business for over five years, and we have over 800 enterprise customers and managed service providers (MSPs) that use or resell our product, a... (more)