Data Protection (Backup and DR) describes the process of creating and storing the data that can be used to recover against data loss A proper backup copy is stored in a separate system or medium, such as tape, from the…
In AWS you can take a snapshot of a volume while a previous snapshot of that volume is in the pending status, having multiple pending snapshots of a volume can result in reduced volume performance until the snapshots complete. There…
Read more here on WiredTiger Storage and the need of application consistency for the MongoDB Check here on adding your AWS account to Nimesa Nimesa supports pre and post script hooks to perform the specific operation before or after a backup,…
I have been building the data protection software for the datacenter and public cloud and i have explored multiple backup products. I am adding my thoughts based on the challenges i faced, based on my interaction with my customers, based…
Everyone is aware that whether you are using on-premise or public cloud you need backup of your Virtual Machines or cloud instances. You can read more about the types of backup here This script creates the application consistent snapshot of…
Everyone is aware that backup is required, Steps and procedure to take the backup differs for each application, server, cloud Having a good copy of your data in the event of accidental data loss is a life-saver, this is the…
Amazon EBS encryption offers a straight-forward encryption solution for your EBS resources that don’t require you to build, maintain, and secure your own key management infrastructure. It uses AWS Key Management Service (AWS KMS) customer master keys (CMK) when creating…
Nimesa supports application-consistent backup of MSSQL databases with the recovery options from instance to table level. Recently we launched the MySQL application consistent backup to the beta customers Application consistency or transaction consistent backups of the Microsoft centric applications like…
A developer identified an attack in his dev virtual machine running on datacenter, and also he found an HTML file named READ_TO_DECRYPT in his desktop Read Protect or Ship Bitcoin or lose data – Ransomware attack After reading that HTML…
All websites available on the internet are vulnerable to hacking attempts, DDOS attack, Data loss, This could happen to WordPress websites as well. WordPress has core files, the wp-content folder where the theme, plugin and the user uploaded post media…