Search
Close this search box.

Category: Data Protection

3 AWS Data Protection Capabilities Explained

AWS includes at least three (3) data protection capabilities that organizations can and often should use to protect their data. Each one offers distinct benefits for any organization that uses them. However, to account for each one’s limitations, organizations may need a third-party solution to best meet their AWS data protection requirements.

Read More
AI-infused solution

Microsoft 365 Data Protection Made Better with AI-infused Solutions

Microsoft 365 represents a software-as-a-service (SaaS) that often gets used by ransomware to enter organizations. This has prompted Microsoft to introduce security and backup services within Microsoft 365 to help organizations recover from these attacks. However, Microsoft only provides some backup and security services to protect Microsoft 365 against ransomware. This leaves openings for AI-infused solutions such as Spin.ai SpinOne to better protect Microsoft 365.

Read More

2024-25 DCIG TOP 5 Sub-2PB Cyber Secure Backup Targets U.S. Edition Report Now Available

DCIG is pleased to announce the immediate availability of the 2024-25 DCIG TOP 5 Sub-2PB Cyber Secure Backup Targets U.S. Edition Report. This report provides guidance on the TOP 5 sub-2PB cyber secure backup targets that organizations should consider in their fight against ransomware. These TOP 5 backup targets afford organizations the best options for accelerating backups, repelling ransomware attacks, and facilitating restores and recoveries.

Read More

2024-25 DCIG TOP 5 Sub-2PB Cyber Secure Backup Targets Global Edition Report Now Available

DCIG is pleased to announce the immediate availability of the 2024-25 DCIG TOP 5 Sub-2PB Cyber Secure Backup Targets Global Edition Report. This report provides guidance on the TOP 5 sub-2PB cyber secure backup targets that organizations should consider in their fight against ransomware. These TOP 5 backup targets afford organizations the best options for accelerating backups, repelling ransomware attacks, and facilitating restores and recoveries.

Read More

Initial Observations from Cyber Secure Storage Research

The relentless rise of cyberattacks has placed data security at the forefront of every organization’s priorities. In response, high-end storage providers are incorporating advanced cyber secure storage features that not only safeguard data but also use AI and machine learning for ransomware anomaly detection, facilitate response by automatically creating a snapshot whenever an anomaly is detected to aid in limiting the scope of the attack, and streamline recovery processes.

Read More

HYCU Embraces Gen AI to Build Universal SaaS Protection 

The pace of technology evolves so fast it’s often difficult for sellers and users to keep up. The most successful IT companies constantly change to meet evolving market demands and take advantage of the latest technologies.  HYCU embraced Gen AI by integrating Anthropics’ AI assistant Claude to create what it calls “universal” SaaS protection. It also built out its SaaS protection ecosystem with developers, integrators, and the major public cloud providers as partners. This helps HYCU and partners create data protection for the wide ranges of SaaS apps on the market. 

Read More

Cohesity’s Bold Move Shakes Up Enterprise Data Protection

Rarely does one wake up to read earth-shaking news in the enterprise data protection industry. However, today represents one of those days with the announcement that Cohesity will acquire Veritas NetBackup. I mean, how often does an emerging enterprise data protection provider boldly step out to acquire an established one? Ah, never. Yet in digesting this news, I begin to see the logic behind this transaction and why this shake-up was needed.

Read More
Kaseya says 93 percent of businesses now depend on technology for core operations

Kaseya’s “1+1+1+1” Acquisition Strategy Totals Much More than One

Small and midsized businesses (SMBs) often want to run the same technologies in their IT environment that enterprises already use. Whether it is cloud technologies, data protection, disaster recovery, high availability, networking, security, or storage, SMBs want them. They also want the right people with the right skills to manage this IT infrastructure. Historically, SMBs could not afford these technologies. Further, even if they do acquire them, they may still lack the in-house expertise to effectively manage them. Delivering on these competing but complementary SMB requirements for IT technologies and skills requires a company focused on them. Based upon what I saw at the recent Kaseya Connect Global conference, Kaseya stands poised to do so.

Read More

Click Here to Signup for the DCIG Newsletter!

Categories

DCIG Newsletter Signup

Thank you for your interest in DCIG research and analysis.

Please sign up for the free DCIG Newsletter to have new analysis delivered to your inbox each week.