Blog: Trends, Technologies, News, and Events - Zerto

Zerto Blog


LATEST POST


Considerations for Disaster Recovery –

Part 1: Storage

One common question that comes up in all disaster recovery planning is, “What type of storage should be used for disaster recovery?” This is not a simple question to answer as there are many considerations, not the least of which is the cost of the storage. Here I am going to outline the primary factors […]

Top Blog Categories

Insights and thought-leadership from our experts on topics impacting IT today, from technology and trends to the latest on ransomware and data protection. Dive into our blogs to learn more!

Most Recent Posts

Top 5 Tips for Cybersecurity Month

Top 5 Tips for Cybersecurity Month

October 10, 2023
Est. Reading Time: 3 minutes

We find ourselves at the start of Cybersecurity Month, a timely reminder of the critical need to fortify your digital defense. With the holiday season approaching, business and consumer activity is expected to surge—and so are cyberthreats. Zerto, a Hewlett Packard Enterprise company, has five essential cybersecurity tips to help shield you from threats beyond […]
Backup Microsoft Azure Active Directory: Safeguard Your Digital Identity

Backup Microsoft Azure Active Directory: Safeguard Your Digital Identity

October 5, 2023
Est. Reading Time: 3 minutes

The Importance of Backup for Microsoft Azure Active Directory In today’s digital landscape, organizations rely heavily on cloud-based services to safeguard critical data and ensure business continuity. Microsoft Azure Active Directory (Azure AD) plays a crucial role as the identity and access management platform for Microsoft cloud services. In this blog post, we will explore […]
Safeguard Our Schools: Bolstering Ransomware Resilience with Zerto

Safeguard Our Schools: Bolstering Ransomware Resilience with Zerto

October 3, 2023
Est. Reading Time: 3 minutes

In today’s digital age, the education sector faces a growing threat: ransomware. During a ransomware attack, malicious software encrypts a school’s data, rendering it inaccessible until a ransom is paid. Ransomware can disrupt classes, compromise sensitive student and staff information, and damage your finances and reputation. A recent article on NewsNationNow, “Hackers Target Schools in […]
Zerto is on the AWS & Azure Marketplaces!

Zerto is on the AWS & Azure Marketplaces!

September 26, 2023
Est. Reading Time: 5 minutes

Zerto, a Hewlett Packard Enterprise company, empowers customers to run an always-on business by simplifying the protection, recovery, and mobility of on-premises and cloud applications. Zerto eliminates the risk and complexity of modernization and cloud adoption across private, public, and hybrid deployments. The simple, software-only solution uses continuous data protection (CDP) at scale to solve […]
Risk Management Process – Part 3d: Risk Map and Risk Assessment Output

Risk Management Process – Part 3d: Risk Map and Risk Assessment Output

September 21, 2023
Est. Reading Time: 5 minutes

So far, we have covered risk identification, risk analysis, and risk controls. All these steps will be used to create a risk map. What Is a Risk Map? The risk map is the final component of risk assessment, providing a visual representation of the identified risks, their probability of occurrence, and their potential impact. It […]
Types of Immutable Data Vaults

Types of Immutable Data Vaults

September 19, 2023
Est. Reading Time: 3 minutes

When we think of the concept of immutable data vaults (IDV) as it relates to data protection, the first thought that comes to mind is: is the data secure and safe? Typically, that is the case—unless the data was somehow compromised prior to it being converted to its immutable state. We all know how important […]
Unlocking the Secrets of Uninterrupted IT Operations: Demystifying High Availability and Disaster Recovery

Unlocking the Secrets of Uninterrupted IT Operations: Demystifying High Availability and Disaster Recovery

September 12, 2023
Est. Reading Time: 4 minutes

In the challenging landscape of keeping your IT operations online all the time, understanding the contrasting methodologies of high availability (HA) and disaster recovery (DR) is paramount. Here, we delve into HA and DR, the dynamic duo of application resilience. Learn what they are, some benefits and drawbacks, and the reasons why you should embrace […]
5 Critical Reasons for Microsoft 365 Backup

5 Critical Reasons for Microsoft 365 Backup

September 7, 2023
Est. Reading Time: 4 minutes

Where is the save button for Microsoft 365? The shared responsibility of protecting and retaining your Microsoft 365 data is not as clear as you would think. The recoverability built-in by Microsoft provides the bare minimum when it comes to making sure the full Microsoft 365 suite is safe in the event of a disaster. […]
Top 10 Reasons to Move to Zerto 10

Top 10 Reasons to Move to Zerto 10

September 5, 2023
Est. Reading Time: 4 minutes

On May 18th, we launched Zerto 10 from our corporate headquarters in Houston, TX. We are incredibly excited about this release because we’ve taken huge steps to expand ransomware resilience even further beyond the low RPOs and RTOs that our customers have come to trust. We want everyone to take advantage of Zerto 10’s new […]
Risk Management Process – Part 3c: Risk Control

Risk Management Process – Part 3c: Risk Control

August 24, 2023
Est. Reading Time: 5 minutes

In our last post, we examined the risk analysis step of risk assessment. The third crucial step in risk assessment is risk control, which involves crafting effective strategies to mitigate the identified risks. There are four fundamental types of risk control: risk acceptance, risk mitigation, risk avoidance, and risk transfer. The Importance of Risk Control […]
Meet SOX IT Compliance Requirements with the Zerto Cyber Resilience Vault

Meet SOX IT Compliance Requirements with the Zerto Cyber Resilience Vault

August 9, 2023
Est. Reading Time: 4 minutes

How the Zerto Cyber Resilience Vault Keeps Your Data Compliant In today's business landscape, where data security breaches are becoming increasingly common, complying with the Sarbanes-Oxley Act (SOX) has become more critical than ever. As a business owner or financial executive, you are responsible for safeguarding your company's sensitive financial information from unauthorized access and […]
Risk Management Process – Part 3b: Risk Analysis

Risk Management Process – Part 3b: Risk Analysis

August 2, 2023
Est. Reading Time: 6 minutes

The second stage of risk assessment is risk analysis, a process that delves deeper into the identified risks (see part 3-a) to gauge their likelihood and potential impact. This step provides a risk-scoring system that enables organizations to prioritize risks according to their specific risk appetite and tolerance. The Importance of Risk Analysis Risk analysis […]

Want to Learn More?

Fill out a quick form and discuss your goals with our engineers.

Take A Platform Tour

Take a tour of our platform and learn the benefits

Free Trial

Try Zerto your own way, in your own environment.

Analyst Reports

Get insights and comparisons from industry analysts into topics such as data protection, backup and recovery, disaster recovery, cloud, containers, etc.

 

Glossary of Terms

Learn the lingo used in the IT industry and understand terms used in the fields of data protection, business continuity, disaster recovery, and more.

IT Uninterrupted

Learn about the ins and outs of IT resilience from industry leaders through virtual events. Access the ones available on-demand.