Xopero Blog

Microsoft Shared Responsibility Model – understanding your role

In a traditional on-premises data center, the organization that owns it is responsible for managing security incidents, including the mitigation and remediation of any dangerous incident. On the other hand, if the company uses Infrastructure-as-a-Service offerings (Azure, AWS) security for infrastructure is the provider’s responsibility. In the Software-as-a-Service model, specifically in Microsoft 365 suite, Microsoft is responsible for maintaining the infrastructure and making sure data is available and accessible while users are responsible for protecting their Microsoft 365 data. It means the user is responsible for restoring lost, stolen, deleted, or compromised data and it should be quite logical and obvious. In the end, it’s the user’s data, right?

Read more

How to use VMware vSphere automation with PowerCLI – first steps

The scale of a virtualized environment might vary greatly. As a system administrator, you probably know that it’s critical to set it up consistently and automate as many processes as possible – no matter the actual size. 

If you’re using VMware ESX / ESXi hypervisors with vCenter as your management software, you already have a lot of automated options at your disposal to help you keep your infrastructure running smoothly. In this article, we will talk about VMware vSphere PowerCLI, which is an automation tool for Microsoft’s Windows PowerShell command-line tool.

Read more

Running Kubernetes on VMware vSphere

If you work in the IT industry, you’ve probably heard the term “Kubernetes,” which is typically used in association with containers technology. Containers may be really beneficial when it comes to developing apps. Kubernetes was intended to address many of the issues that come with deploying applications, most notably by automating and orchestrating deployments and availability. In this article, we will take a closer look at how Kubernetes works with VMware.

Read more

Intro to the virtualization: types, benefits, and disadvantages you should consider

Virtual machines stormed the IT world, bringing new ways of running IT environments. In a world where the amount of data gathered, transformed, and stored skyrocketed, there sprouted a need for more powerful hardware or optimization of usage of the existing one. And there the VMs are a great solution. In this article, we will discuss the types of virtualization. We will also take a closer look at the benefits and downsides of virtualization and virtualizing your infrastructure. 

Read more

How does granular recovery work and what do you need to know about it

In the modern office environment, every person working on projects generates huge amounts of data. Emails, datasheets, presentations, databases, documents, and many many more. Protecting this information is very important from the business standpoint, so usually, organizations tend to use backups as the mean of protecting their data. But backup is only one part of the equation. What would you do if somehow you lose that data? Well, you probably want to quickly and easily recover it. Then you should think about setting up a granular recovery (alt. granular restore) plan which is also the main topic of this article. 

Read more