Blog - Zerto

Zerto Blog


LATEST POST

How to Protect Your Database with Zerto

For a business, databases have become more valuable than diamonds, as they often store millions of dollars in value. However, unlike diamonds, databases are dynamic and therefore require protection from a plethora of vulnerabilities and data loss. Database contents change depending on the applications they serve, and they need to be protected alongside other application […]

Top Blog Categories

Insights and thought-leadership from our experts on topics impacting IT today, from technology and trends to the latest on ransomware and data protection. Dive into our blogs to learn more!

Most Recent Posts

Why Containers are Susceptible to Ransomware (& How Zerto Can Help!)

Why Containers are Susceptible to Ransomware (& How Zerto Can Help!)

No application is safe from ransomware. In 2022, IDC conducted a study to understand the evolving requirements for ransomware and disaster recovery preparation. This study uncovered a demand for data that has never been greater, and yet the vulnerability and risks to data integrity are escalating, with ransomware attacks growing in both severity and scale. […]
Keep Your Data Safe: Get Your Zerto Certification Now

Keep Your Data Safe: Get Your Zerto Certification Now

What would you do if all your systems went down? In a study conducted by IDC and sponsored by Zerto, 94% of organizations reported unplanned downtime. In today’s business landscape, an organization’s survival depends on safekeeping their data. Zerto, a Hewlett Packard Enterprise company, is an industry leader in helping companies protect and move their […]
CRN Names Zerto as ‘Data Protection and Management Product of the Year’ for 2022

CRN Names Zerto as ‘Data Protection and Management Product of the Year’ for 2022

Beating out a host of leading technology industry names, including Rubrik, Veeam and Veritas, Zerto 9.5 has been named by CRN as Data Protection and Management Product of the Year in its annual Tech Innovator Awards. As the highest-scoring overall winner, Zerto 9.5 brings its ransomware recovery capabilities to the leading cloud providers, enabling organizations […]
Zerto Virtual Manager Appliance – What You Need to Know

Zerto Virtual Manager Appliance – What You Need to Know

In Zerto 9.5, Zerto introduced a new Zerto Virtual Manager Appliance (ZVMA) and an alternative to creating your own Windows-based ZVM deployment on a virtual machine. This virtual appliance is designed to be easier to deploy, easier to manage/maintain, and more secure. If you are an existing Zerto customer with Windows-based ZVM deployments or just […]
The Best Gets Even Better: Zerto and DRaaS Updates

The Best Gets Even Better: Zerto and DRaaS Updates

Why DRaaS? Implementing a disaster recovery (DR) solution can be a complex task for an organization that is new to the process. Obtaining the expertise, finding a suitable DR site, choosing the right DR solution, formulating an effective DR strategy, and testing DR plans can be overwhelming and lead organizations to implement less-than-ideal DR plans […]
Risk Assessment, BIA, SLAs, RTOs, and RPOs: What’s the Link? MTD and MTDL

Risk Assessment, BIA, SLAs, RTOs, and RPOs: What’s the Link? MTD and MTDL

Risk assessment, business impact analysis (BIA), and service level agreement (SLAs) are indispensable to the development and implementation of business continuity and disaster recovery (BCDR) plans. As such, organizational leaders must thoroughly understand these terms: their similarities and differences, and how to leverage them to safeguard their business operations from threats and disruptive events. Differentiating […]
Comparing Resilience – Part Five: Resilience with Business Continuity and Business Strategy

Comparing Resilience – Part Five: Resilience with Business Continuity and Business Strategy

In the concluding part of our five part mini-series, we are going to put the pieces together. We’ll see how the three dimensions we consider foundational to building business resilience—operational resilience (part two), IT resilience (part three), and cyber resilience (part four)—relate to business continuity, a tangible part of business resilience in the immediate to […]
Scary DR Stories 2022: Stranger Disasters and Gasping Recoveries

Scary DR Stories 2022: Stranger Disasters and Gasping Recoveries

October may have come to an end, but the stranger disasters that organizations face are still happening every day and will continue to rise. Top Three Cyber Threats of 2022 This year, the top three shared challenges of organizations were: Ransomware and the rise of RaaS—Ransomware continues to increase yearly, with attacks happening every 11 […]
Zerto Survey Reveals the Need for Comprehensive Cybersecurity Strategies

Zerto Survey Reveals the Need for Comprehensive Cybersecurity Strategies

More than ever, companies rely on data to perform day-to-day operations. Businesses can’t function at their best without it. That’s why it’s so important to adapt internal strategies as cyberthreats and challenges evolve, and existing threats grow more dangerous. Zerto, a Hewlett Packard Enterprise company, conducted the 2022 Ransomware Strategy Survey to measure how companies […]
Managing Cyberthreats to Combat Ransomware Part 3: Cybersecurity Frameworks

Managing Cyberthreats to Combat Ransomware Part 3: Cybersecurity Frameworks

As we continue with our third and final blog in this series on managing cyberthreats, we’ll explore frameworks from the National Institute of Standards & Technology and Center for Internet Security, which together provide time-tested knowledge and best practices used to combat ransomware. National Institute of Standards & Technology National Institute of Standards & Technology […]
Comparing Resilience – Part Four: Cyber Resilience

Comparing Resilience – Part Four: Cyber Resilience

If IT Resilience is the cornerstone of business resilience as seen in part three, in today’s digital world, cyber resilience is an extension of it, and one of its other pillars. Indeed, besides any business’ need to be able to cope with natural disasters or planned outages (maintenance, etc.), it is imperative that an organization […]
Comparing Resilience – Part Three: IT Resilience

Comparing Resilience – Part Three: IT Resilience

Let’s summarize where we stand. In part one, we covered business resilience. In part two, we went over operational resilience and showed its slightly narrower scope and approach. In part three, we are going to look at a cornerstone of business resilience, IT resilience. What Is IT Resilience? IT resilience refers to the ability to […]

Want to Learn More?

Fill out a quick form and discuss your goals with our engineers.

Take A Platform Tour

Take a tour of our platform and learn the benefits

Free Trial

Try Zerto your own way, in your own environment.

Analyst Reports

Get insights and comparisons from industry analysts into topics such as data protection, backup and recovery, disaster recovery, cloud, containers, etc.

 

Glossary of Terms

Learn the lingo used in the IT industry and understand terms used in the fields of data protection, business continuity, disaster recovery, and more.

IT Uninterrupted

Learn about the ins and outs of IT resilience from industry leaders through virtual events. Access the ones available on-demand.