[vc_row][vc_column][vc_column_text] Understanding the Impact of Malware The term “malware” is a shortcut way of referring to malicious software installed on a system without the owner's permission or knowledge. Malware tends to produce two major effects, both of them...
Data Protection
Download the Buyer’s Guide to Virtual & Physical Data Protection
This new eBook, courtesy of Dell AppAssure, will help you sort through the new as well as the more traditional data protection approaches, providing the background you need to select the right approach for your environment. About the Author: Greg Shields Microsoft...
A Guide to Malicious Software and Their Threat to Data Security
[vc_row][vc_column][vc_column_text] A Basic Understanding of Viruses Trojans, and Worms Most small business owners have probably seen news reporting on viruses, worms, and Trojans, but they may not have a terribly clear understanding of how these forms of malware...
AppAssure Data Backup Video: Recovery via Remote Mount of SQL Data
[vc_row][vc_column][vc_column_text] AppAssure Data Backup Software Video Series: Recovery via Remote Mount of SQL Data AppAssure Product Demo Ever have a large database restore to recover a table, a couple of rows or some subset of data only to find out you don’t have...
Improved Data Security Against New Threats
[vc_row][vc_column][vc_column_text] SSL or TLS Promote Improved Data Security Against New Threats In today's business world, there is virtually no company that can operate completely without computers and related technology. Large businesses and corporations usually...
AppAssure Data Backup Video: Restore a Volume(s)/ Live Replay
AppAssure Data Backup Software Video Series: Restore a Volume(s)/ Live Replay AppAssure Product Demo Ever lose a disk or a volume? Know what it takes to restore that volume in terms of time and effort? Users are down during the fix time as well as the recovery time....
Managing Risk – Data Security Strategy
Posted by M. Ursula Herrmann Crain's Cleveland Business Guest Blog Post of 7-27-12 In managing risk, a line to walk in finding acceptable levels Mary Ursula Herrmann is a Network Security Analyst living in Juneau, AK. She has worked in Information Security for over 15...
AppAssure Data Backup Video: Recover a File
AppAssure Data Backup Software Video Series: Recover a File AppAssure Product Demo Navigating through the world of backup software interfaces, the one thing in common is the fact that the bulk of your recoveries are at the file / folder level and you are learning a...
AppAssure Data Backup Video: Attachability Check for SQL
AppAssure Data Backup Software Video Series: Attachability Check for SQL AppAssure Product Demo What about your other most critical applications? SQL Server is backed up, but can you recover from the backup? In this video, we will walk you through how SQL data is...
Data Protection Webinar
Free Webinar- Trends in Hyper-V Data Protection Imagine push-button recovery for Hyper-V virtual machines. Click… Done. In the old world of tape backups and file-based agents, that kind of speed wasn’t possible. Join Greg Shields of Concentrated Technology and Joe...