Sergey Zimin

Backup scheduling best practises to ensure availability

Imagine a scale where the two endpoints represent two extreme data protection policies. The endpoint on the left-hand side of the scale is marked, “good backup of the system when it was configured and released into Production” (i.e. “day-zero backup”). The endpoint on the right-hand side of the scale is marked, “real-time mirroring/replication”. These two …

Backup scheduling best practises to ensure availability Read More »

iSCSI vs. NFS – which one is better choice for Instant VM?

iSCSI vs. NFS – which one is better choice for Instant VM? Occasionally I come across a discussion about which approach is better to serve backup data to an Instant VM – iSCSI or NFS, or any others? Those who advocate NFS quite often say that if the target hypervisor supports NFS storage and the …

iSCSI vs. NFS – which one is better choice for Instant VM? Read More »

Are your backups safe from Malware?

Recent reports from multiple sources reveal the weight of ransomware attacks has recently skewed towards MSP networks. Sources confirm in some cases the hacker’s penetration causes disabling backup and disaster recovery (BDR) systems. Depending on how MSP’s handle end-customer separation from MSP environment – the ransomware can either be propagated to the end-user fleet, or …

Are your backups safe from Malware? Read More »

Combat Malware

ActiveImage Protector: adding anti-malware Controls

Recent reports from multiple sources reveal the weight of ransomware attacks has recently skewed towards MSP networks. Sources confirm in some cases the hacker’s penetration causes disabling backup and disaster recovery (BDR) systems. Depending on how MSP’s handle end-customer separation from MSP environment – the ransomware can either be propagated to the end-customer fleet or …

ActiveImage Protector: adding anti-malware Controls Read More »

Deduplication: pros, cons, what to look for and what to expect from it.

  We will not try to get down to the molecular level. The main intention of this article is to shed some light on deduplication-relevant pros and cons and to broaden view of this topic. In computing, the simplest and the most effective definition (by Wikipedia) of Data Deduplication goes as “a specialized data compression …

Deduplication: pros, cons, what to look for and what to expect from it. Read More »

Scada BDR

ActiveImage in SCADA environment

SCADA (Supervisory Control And Data Acquisition) Systems control the automation in many industries such as Power, Water, Manufacturing, Energy, Mass Transit and more. SCADA systems are computer based, and so even the best system will fail at some point for reasons such as: Hardware Failures (disk failure, power surges, aged equipment, etc). Software Failures (viruses, …

ActiveImage in SCADA environment Read More »