Zerto Blog
LATEST POST
Zerto Access Management: Role-Based Access Controls with Keycloak
Implementing Identity and Access Management (IAM) within data protection applications is critical in today’s interconnected digital landscape. IAM serves as the first line of defense, ensuring that only authorized individuals or systems can access sensitive data and resources. By effectively managing user identities, roles, and permissions, IAM enhances security measures, mitigates insider threats, and safeguards […]
Top Blog Categories
Insights and thought-leadership from our experts on topics impacting IT today, from technology and trends to the latest on ransomware and data protection. Dive into our blogs to learn more!
Continuous Data Protection
Ransomware Recovery
Disaster Recovery
Business / IT Resilience
Most Recent Posts
Australian Securities Exchange Outage: A Recurring Reminder Of The Need for IT Resilience
Not Just a Unitasker: Zerto’s Virtual Replication
Zerto Virtual Replication: What’s New in 5.0
ZertoCon Local is Here! Ransomware, ZCP Certifications, and More…
Introducing the Idea of Resilience for Evolving IT
Highly Resilient Hybrid Cloud with Zerto Cloud Continuity Platform
Zerto Protects VMware Cloud Foundation on IBM Cloud (SoftLayer)
What’s Hot at VMworld 2016
Zerto’s Virtual Replication vs. VMware Site Recovery Manager (SRM): How Do They Compare?
Zerto vs vSphere Replication Comparison: How to Choose?
Zerto at VMworld 2016 – What to Expect
Analyst Reports
Get insights and comparisons from industry analysts into topics such as data protection, backup and recovery, disaster recovery, cloud, containers, etc.
Glossary of Terms
Learn the lingo used in the IT industry and understand terms used in the fields of data protection, business continuity, disaster recovery, and more.
IT Uninterrupted
Learn about the ins and outs of IT resilience from industry leaders through virtual events. Access the ones available on-demand.