VMware is a company that owes its success to its virtualization products. Currently, the company’s portfolio includes solutions aimed at infrastructure virtualization, clouding, cybersecurity, disaster recovery, and much much more. In addition, speaking only about the Hyper-Converged Infrastructure department, we must bear in mind that VMware provides several different solutions. The question is obvious, which is the product for me?
Read moreXopero Blog
BrakTooth flaws / LockFile ransomware / Malware hides in AMD, NVIDIA GPUs
Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.
Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.
In the meantime, let’s check what happened in the cyber-world last week.
Read moreVMware vSphere, vCenter, and ESXi – definitions and differences
Are you already familiar with VMware technology, and just want to learn more about a variety of provided features and components? Or maybe you are new to VMware virtualization and want to learn about some of the key components needed for creating a successful virtual environment? In this article, you will find information about the VMware VSphere, vCenter, and ESXi, what are those technologies’ purpose, and for what business needs they answer. We will also find differences between vSphere, ESXi, and vCenter.
Read moreVMware vRealize Operations patched / Malicious WhatsApp / MS Power App data leak
Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.
Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.
In the meantime, let’s check what happened in the cyber-world last week.
Read moreHow to convert VMware to Hyper-V
On the pages of our blog, we have already discussed virtualization tools from VMware, but it must be remembered that this is not the only solution of this type on the market. Microsoft has been heavily involved in virtualization since 2008 and is developing its project codenamed Viridian. Let’s check and compare how both companies approached converting virtual machines between competing virtualizers.
Read moreLinux glibc security glitch / Fortinet 0-day / New AdLoad malware variant
Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.
Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.
In the meantime, let’s check what happened in the cyber-world last week.
Read moreVMware ESXi – how to backup a virtual machine
Currently, Microsoft has introduced a new service called Windows 365 Cloud PC according to the “as service” approach it promotes. It is, of course, nothing but virtual computers on Microsoft’s servers. Likewise, containers, of which Docker is perhaps the most famous representative, are virtualized elements or entire operating systems. We can also virtualize the entire physical infrastructure, and that’s what VMware ESXi is for.
Read moreBiggest ever cryptocurrency theft / StealthWorker botnet / ProxyShell
Great thefts stir the imagination like no others. The famous D B Cooper’s case, the United California Bank robbery, or the Great Train Robbery from 1963. Do “electronic” thefts stir the same amount of emotions? It’s hard to say, but when over 600 million dollars disappears from one of the financial platforms, it will bring a lot of hype. But let’s keep our feet on the ground and ask really important questions. Namely, how does it happened, was there a way to prevent the theft, is there any chance to get the money back, and what about the victims – BinanceChain, Ethereum, and Polygon miners?
Read moreHow to backup Microsoft 365 with Xopero ONE
Microsoft is a leader in the industry of productivity applications suites. And as such is trying to provide as complex security measures as possible. Yet it’s not possible to avoid nor protect from every threat. That is why you should not blindly trust the protection provided by Microsoft in their Office 365 suite, but rather add layers of protection to ensure your data is safe. That layer of protection can be a Microsoft 365 backup. With Xopero ONE Backup & Recovery you can set up Microsoft 365 backup, manage it, and recover data if needed with ease. In this article, we will walk you through the steps you need to take to start backup Microsoft 365 data in your organization with Xopero ONE, and we will go into more detail about setting up a personalized backup plan.
Read moreVMware snapshot technology: what it is and when to use it
In recent years, VMware has put great emphasis on its cloud technologies. Still, you have to remember that estimates show that the company’s solutions are present on about 75% (data for 2019-2020) of physical servers intended for virtualization on our globe. This means that VMware ESXi is still a leading virtualization solution, and one of the most appreciated features of this solution is undoubtedly the snapshot technology. Thanks to snapshots, for example, we can do some “kind of backup” at the moment without stopping the virtual machine, and this is something that everyone loves, but why shouldn’t I use the word “backup” in this sentence?
Read more