ABCDEFGHIJKLMNOPQRSTUVWXYZ Jump to: ABCDEFGHIJKLMNOPQRSTUVWXYZ A Active Directory Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It’s essential in managing the identities and relationships that make up a network environment. It provides the foundation for a secure and efficient IT infrastructure for businesses, making it easier to manage users, computers, and other resources. Read more Air Gap Backup: Without It, Your Data Protection Strategy Is At Risk Air gap backup refers to a backup system that is physically isolated from the main computer or network, creating a “gap” between the two systems. This separation ensures that the backup data is not accessible to hackers or malware that may have infected the primary system. Read more B Backup as a service (BaaS) Backup as a service (BaaS) solutions offer cloud-based data backup and recovery capabilities without the presence of physical, on-premises hardware or appliances to host and run the backup infrastructure. Read more Backup Policy Enterprise Strategy: Set of Rules and Procedures A backup policy is a set of rules and procedures that describe the enterprise’s strategy when making backup copies of data for safekeeping. Read more Business Continuity Disaster Recovery “Business Continuity Disaster Recovery”, or “BCDR” for short, is used throughout the IT industry as a benchmark for organization resiliency in the face of unplanned disruptions. ‘Business Continuity’ refers to an organization’s level of readiness to continue mission-critical operations throughout and after an emergency or disruption. Read more C Cleanroom Recovery: A Comprehensive Data Retrieval Technique Cleanroom Recovery is a specialized data recovery process that ensures the secure and reliable retrieval of critical information from damaged storage devices in environments where data contamination poses a significant risk. Read more Cloud Storage an IT infrastructure deployment Cloud storage describes an IT infrastructure deployment model where storage resources reside in the cloud instead of being housed in data centers on-premises. Read more Containerization Containerization is a method of software application deployment that involves packaging an application and its dependencies into a single lightweight container. The container provides a consistent and isolated runtime environment, which allows the application to run reliably and consistently across different computing environments, such as local machines, data centers, or cloud platforms. Read more Cyber Deception Cyber deception is a proactive security and defense tactic which hinges on deceiving bad actors and malicious attacks. Read more Cyber Kill Chain The Cyber Kill Chain is a seven-stage model that describes the sequence of events in a typical cyber-attack. It provides a comprehensive framework for understanding the different stages of an attack and developing strategies to detect and prevent them. Read more D Data Center Migration Data center migration is the process of moving data and applications from one physical or virtual environment to another. This process can be complex but is necessary to keep up with changing technology and customer demands. Read more Data Deduplication Data deduplication, also called “dedup”, eliminates duplicate or redundant information in a dataset. In short, dedup is a process that ensures only one copy of data exists in a particular dataset or block. Read more Data Encryption Data encryption is a type of security process that converts data from a readable format called plaintext into an encoded, unreadable form called ciphertext. Read more Data Loss Prevention Data protection is everyone’s job, not just an IT function. Data loss prevention (DLP) is part of a company’s security policy to prevent the loss, leakage, misuse, or access of data by unauthorized parties. Read more Data Management as a Service (DMaaS) DMaaS stands for Data Management as a Service. It is a cloud-based service model that allows organizations to outsource their data management tasks and responsibilities to a third-party service provider. Read more Data Protection Data protection refers to the practices, technologies, and policies that are used to safeguard data against unauthorized access, loss, corruption, and other threats. This includes protecting data at rest (stored data), in transit (data being transferred between systems), and in use (data being accessed by authorized users). Read more Data Retention Policy An organization’s data retention policy is a set of rules that describe the types of data that will be retained by the entity and for how long. Read more Database backup Database backup is the process of creating a copy (backing up) of an organization’s structured data utilized by popular databases such as SAP HANA and Microsoft SQL Server. Read more Digital transformation Digital transformation is the process of using digital technologies to fundamentally change how a business operates and delivers value to its customers. It involves using digital technologies to automate processes, improve efficiency, and create new business models, products, and services. Read more Disaster Recovery Disaster recovery (DR) is the process of restoring an organization’s IT infrastructure and operations after a major disruption or disaster. The goal of disaster recovery is to minimize the impact of a disruptive event and restore normal operations as quickly as possible to minimize the impact on the organization’s business processes and reputation. Read more Distributed File System The world of IT and computing has become increasingly complex and distributed, with data stored on multiple servers or devices. To manage this complexity, organizations are turning to Distributed File Systems (DFS) to store, organize, and share data in a secure and efficient manner. Read more Dynamics 365 Backup Dynamic 365 Backup is simple. It is data backup for Microsoft Dynamics 365, which offers comprehensive coverage for CRM data stored within the platform, such as files, customer records, transactions, behaviors and preferences, as well as order information, inventory and shipping. Read more E eDiscovery Electronic Discovery (eDiscovery) is the process of finding and collecting electronically stored information (or ESI) – typically for lawsuits, investigation, or legal purposes. Read more Endpoint Backup Endpoint backup solutions offer data protection for employee user devices, including desktops and laptops for today’s remote workforce. Read more F FedRAMP High Authorization With the escalating frequency of data breaches, concerns regarding cybersecurity have reached new heights, particularly within the Federal government. Despite assumptions about impenetrable security measures, federal agencies remain vulnerable to cyber threats, making them prime targets for malicious actors. The Federal Risk and Authorization Management Program (FedRAMP) serves as a standardized framework aimed at mitigating risks associated with cloud products and services used by federal agencies. This comprehensive guide delves into the intricacies of FedRAMP, including its objectives, development history, compliance categories, certification process, and the benefits of achieving FedRAMP compliance. Read more FedRAMP High vs Moderate The Federal Risk and Authorization Management Program (FedRAMP) stands as a critical government-wide initiative aimed at protecting the security of federal data stored in cloud computing environments. This analysis dives into FedRAMP High, providing a comprehensive exploration of its key components. It’s use in cloud environments, implementation challenges, and an intricate comparison with FedRAMP Moderate. Additionally, specific use cases are scrutinized to offer recommendations on when one level proves more suitable than the other. Read more File and Object Backup File and object backup solutions offer data protection for two different unstructured data types: object storage and file systems. First, object storage is a computer data storage architecture that manages data as objects, unlike file systems that contain data in a file hierarchy. Read more H Hybrid Cloud Hybrid cloud is IT architecture that combines at least one private cloud, also known as an on-premises data center, with one or more public cloud services. Read more Hyper-Converged Infrastructure Hyper-converged infrastructure (HCI) is a type of software-defined infrastructure that integrates computing, storage, and networking components into a single system. HCI aims to simplify data center management and reduce the complexity of traditional IT infrastructure. Read more I IaaS, PaaS, and SaaS IaaS PaaS and SaaS in the ever-evolving world of technology, cloud computing is revolutionizing how businesses operate and innovate. Read more K Kubernetes Backup Kubernetes backup is the process of backing up the components running in a Kubernetes orchestration platform, that is an abstraction layer for containerized applications and services. Read more M Microsoft 365 Backup Microsoft 365 (sometimes referred to as O365) is a popular SaaS (solution-as-a-service) offering for today’s businesses. With Microsoft 365, end users and organizations get a robust suite of productivity tools, which include Exchange Online, OneDrive for Business, SharePoint Online, and Microsoft Teams among others. Read more O On-Premises, Cloud, and Hybrid When it comes to choosing the right technology solution for your business, understanding the key differences between on-premises, cloud, and hybrid solutions is essential. Read more Overview of Data Center Consolidation Data center consolidation is an important strategy for many modern organizations. By combining multiple physical data centers into one or more larger data centers, organizations can save money, improve efficiency, and increase scalability. Read more R Ransomware Protection Ransomware protection is the process of preventing the occurrence of a ransomware event, and/or mitigating the risk of a successful attack. Read more RTO (Recovery Time Objective) and RPO (Recovery Point Objective) RTO (Recovery Time Objective) and RPO (Recovery Point Objective) are two important metrics used in disaster recovery and business continuity planning. Read more S SaaS Data Protection SaaS data protection offers organizations tools to manage and safeguard critical SaaS apps, endpoints, and hybrid cloud environments from data loss threats such as corruption, accidental deletion, and malicious attack. Read more Salesforce Backup Salesforce backup and recovery offers automated data protection for content, files, objects, metadata relationships, and more living in Salesforce production organizations and sandbox environments. Read more V Virtual Machine Backup Virtual machine backup (VM backup) is the process of backing up the virtual machines (VMs) running in an enterprise environment. Read more VMware Data Recovery VMware Data Recovery is designed specifically for VMware virtualized environments and enables organizations to protect and recover their virtual machines (VMs) and data efficiently and reliably. Read more Vulnerability Network Scanning Vulnerability network scanning is an invaluable tool for keeping networks safe from malicious actors. It is a process that involves the scanning of a network for security weaknesses or vulnerabilities, and it can be done either manually or with automated software. Read more Z Zero Trust Security Zero Trust Security is a security approach that assumes that all user activity on a network or system is untrusted, even from users who have already been authenticated. Read more Free SAAS Trial Get Started with Cloud-Delivered Data Protection Today!Try enterprise-grade SaaS data protection with the simplicity of the cloud free for 30-days. Try Now Quick Links All Resources Case Studies Supported Tech Webinars & Events Training & Education Take the first step See what a world-class data services platform can do for your business. Get a demo