Xopero Blog

How to use VMware vSphere automation with PowerCLI – first steps

The scale of a virtualized environment might vary greatly. As a system administrator, you probably know that it’s critical to set it up consistently and automate as many processes as possible – no matter the actual size. 

If you’re using VMware ESX / ESXi hypervisors with vCenter as your management software, you already have a lot of automated options at your disposal to help you keep your infrastructure running smoothly. In this article, we will talk about VMware vSphere PowerCLI, which is an automation tool for Microsoft’s Windows PowerShell command-line tool.

Read more

Intro to the virtualization: types, benefits, and disadvantages you should consider

Virtual machines stormed the IT world, bringing new ways of running IT environments. In a world where the amount of data gathered, transformed, and stored skyrocketed, there sprouted a need for more powerful hardware or optimization of usage of the existing one. And there the VMs are a great solution. In this article, we will discuss the types of virtualization. We will also take a closer look at the benefits and downsides of virtualization and virtualizing your infrastructure. 

Read more

Granular Recovery Technology: How Does It Work and What Do You Need to Know About It

In the modern office environment, every person working on projects generates huge amounts of data. Emails, datasheets, presentations, databases, documents, and many many more. Protecting this information is very important from the business standpoint, so usually, organizations tend to use backups as the mean of protecting their data. But backup is only one part of the equation. What would you do if somehow you lose that data? Well, you probably want to quickly and easily recover it. Then you should think about setting up a granular recovery (alt. granular restore) plan which is also the main topic of this article. 

Read more

AES encryption 101 – why you should use encrypted backup

For many, encryption is a golden standard in data protection and the best way to ensure a high level of security in professional backup solutions. Could encryption be used as a mitigation mechanism against data breach events too? Yes. AES encryption is truly one of the most effective tools in the security professional’s arsenal. In this article, we will touch upon a variety of fundamental topics in data encryption. And if you prefer a more practical approach there is also an in-depth presentation of how Xopero ONE allows to encrypt [and protect] backed up data.

Read more

Data compression – why should you compress your backups?

With the growing number of data created by the Business every day (week or month) some easy ways to shrink the size of backups would help to improve data storage management. If only… But there is a quite smart solution for this problem. And in this article, we will talk about it. As you probably guessed our today’s topic is backup compression, and how it helps create a better backup strategy.

Read more

Grandfather-Father-Son backup – how does the GFS backup scheme work?

In the world of cybersecurity, we have a few problems that need to be solved. One of them is consistent data protection, where the backup has/plays a special role. There is this unattainable dream to keep all of your backup copies forever. Unfortunately for many organizations, such a task would be simply impossible to execute. Keeping backups requires storage space, which runs out quite quickly. 

Read more

Why backup Microsoft 365? How to convince a non-technician that your organization needs a backup solution

If you are wondering whether your Microsoft 365 data is protected by the provider – the answer is definitely yes, but maybe not to the extent you have in mind. In this article, I will present to you the problems that come with Office 365 and why you need to protect it with a dedicated Microsoft 365 backup. We will also discuss how to convince a non-technical to the necessity of such an investment.

Read more

Amazon’s Twitch data leak / Apache HTTP Server 0-day / VMware ESXi targeted in a new campaign

Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.

Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.

In the meantime, let’s check what happened in the cyber-world last week.

Read more