Operations | Monitoring | ITSM | DevOps | Cloud

Backup

UniSuper Google Cloud Outage Reveals Need for Keen Backup and DR Planning

Earlier this month, Google Cloud disclosed that it accidentally deleted the account of its customer UniSuper, a $125 billion Australian pension fund. According to a joint statement from Google Cloud and UniSuper, the deletion occurred due to an “inadvertent misconfiguration.” As a result, more than 600,000 pension fund users were unable to access their accounts for over a week. UniSuper had geographical redundancy built into its Google Cloud environment, according to the statement.

Unlock Peace of Mind: Database Backup Strategy

Stop worrying about data loss and use NinjaOne Backup to help back up your databases! This webinar will showcase several strategies on how to backup common databases like SQL or QuickBooks using NinjaOne Backup – including what steps to take, the automation to utilize, and effective scheduling tactics.

How, and why, we applied machine learning to Cove Continuity, part 1

Over the next three blogs, I want to explain how we used machine learning to increase Cove Continuity boot-check accuracy to 99%. Cove Continuity offers the ability to restore source (protected) servers/workstations to virtual machines (VMs) in Hyper-V, ESXi, or Azure. After a VM is restored, Cove performs a boot-check test to prove that the system was properly restored.

Making Data Storage More Secure with Progress Flowmon and Veeam Backup and Replication

The new partnership between Progress and Veeam represents a significant step forward in cybersecurity. It marks a considerable advancement in data protection by merging the Flowmon AI-powered threat detection capabilities with the robust backup solution of Veeam. This empowers organizations to more effectively defend their invaluable digital assets.

Data Replication Strategies: Ensuring Data Availability and Redundancy

Data replication is a fundamental component of modern IT infrastructure, serving as a backbone for ensuring data availability and system resilience across networks. In essence, data replication involves the process of copying and storing data from one location to several others, enabling a system to recover from data loss or failures seamlessly. This capability is crucial not just for operational continuity but also for effective disaster recovery and business continuity planning.

Top 5 HIPAA-Compliant Cloud Backup Services in 2024

HIPAA (the Health Insurance Portability and Accountability Act) is a law that regulates how healthcare organizations manage and protect personal medical data. From the perspective of IT professionals, HIPAA defines how you keep your managed clients’ identifiable information safe, secure, and, most importantly, private. HIPAA is comprised of five sections called titles.

Cloud Agnostic Backups on Cycle.io

At Cycle.io, we see many unique situations involving data requirements, retention, and security. As a multi/hybrid cloud and LowOps platform, we've had to come up with some pretty interesting solutions for backups and data protection. Dive in with Cycle's co-founder and head of engineering, Alexander Mattoni, as he is easily able to deploy a postgres instance, with automated backups to offsite storage in the span of minutes.

Reliable Backups in a Multi-Cloud World

Proper backups are universally acknowledged as essential, yet they grow increasingly tedious and prone to error as DevOps complexity escalates. While some managed database services offer automated backup solutions, the scope of your backup requirements is likely to expand as the business and products scale. There's a considerable chance you'll find yourself hosting your own databases or stateful services, a task that can seem daunting in its demand for precision and reliability.

10 Best Cloud Backup Solutions

Much has changed in the digital space, but one thing will remain important for organizations—safeguarding their entire digital environment. While data is the lifeblood of companies and businesses, protecting a digital environment goes beyond that. From confidential records to operating systems, applications to databases, the potential compromise of these components is a threat.