Introducing Clumio’s integration with AWS CloudTrail Lake Audit logs are a vital tool in any security team’s toolbox. They help track and monitor user activity across applications, systems, and networks. Not only do they help identify suspicious activity, like a user accessing a privileged system they don’t have access to, but also are a key piece in forensically looking at the history and timelines of an event to determine everything that happened.
Adding Ransomware Protection to Your Amazon Cloud Backup Businesses of all types and sizes are increasingly at risk from ransomware attacks in today’s cybersecurity landscape.
How to Create a Backup Plan for Compliance & Data Security In today’s increasingly digital world, compliance and data security are critical to the success of any business.
Essential Disaster Recovery Capabilities for Business Continuity Management Business continuity management involves keeping tabs on a number of components needed to keep a business up and running during a disaster event. On the IT side of things, this mainly revolves around backing up, safeguarding, and restoring enterprise data and workloads.
Is the Mandela Effect Leaving Your AWS Data Vulnerable? Humanity’s collective memory can be a little fuzzy. Case-in-point: The Mandela Effect, or the phenomenon of large groups of people misremembering the same fact or event in a similar way. The effect is named after Nelson Mandela, who many people believe died in prison in the 1980s despite the fact that he actually went on to become President of South Africa in the 1990s.
How Cloud-native Data Protection Boosts Your Sustainability Efforts You’ve heard the terms before. Sustainable, net-zero, green approach, low carbon footprint, eco-friendly, impact-free. But can we move the needle with the way we store and manage our data? Moving from on-prem to cloud could be one of the greatest contributions to reducing a company’s carbon footprint.
Controlling Costs of Cloud Backup Services Cloud backup services can provide several valuable cost-efficiencies for backup and storage of enterprise data, but if you move forward with a solution before doing your due diligence, you could be met with a slew of unexpected costs. Many cloud backup vendors have confusing and complicated pricing models that make it difficult to predict the total cost of ownership (TCO) on a monthly, quarterly, or annual basis, and hidden costs can cause your cloud backup bills to fluctuate wildly. While it’s best to choose a backup solution with transparent pricing and an easy-to-understand cost model, it’s important to understand what those unpredictable costs generally are. Here are the three biggest contributors to cloud backup cost fluctuations.
Leveraging AWS API Gateway in Clumio The need for an API Gateway : In a microservices-based architecture for an enterprise-level system like Clumio, it is impractical to have a public endpoint per microservice. One of the major problems is the tight coupling this introduces between the client and the server. In addition, each microservice needs to implement and maintain the common pieces like logging, tracing, security (authentication, authorization, rate-limiting).
Enhancing Clumio’s Bring Your Own Key (BYOK) Feature Don’t you love the beginning of the year when you come up with a resolution that gives a surge of motivation to achieve? But as new priorities emerge, your determined sprint inevitably becomes a leisurely walk. So long as you periodically remind yourself why you made the resolution in the first place, even slow progress will eventually get you to your goal.
How BioPlus Simplified Ransomware Protection Several weeks back, Clumio Systems Engineer Jeff Lackey had a discussion with one of our awesome customers, Fred Gagle, about his company’s journey to the cloud.
The Joys and Pitfalls of DIY For most of my life, I’ve been a builder. As a young child, my imagination was consumed with a passion for cars. I’d stroll down the hobby aisle and see flashy scale models of American muscle cars with their custom flame paint, exotic European sports cars with amazing detail. I was mesmerized. I would mow yards […]
Snapshots and Backups and Replication, Oh my! At times we undervalue our many experiences in the data center (aka on-premises) world and how they translate directly into the Cloud. One such experience is understanding what’s behind the curtain when it comes to protecting your AWS data sources. Or, you think you understand your current strategy but are unaware of other options available to you.
What Is a Data Retention Policy? A data retention policy is a set of guidelines that outline how long specific types of data are to be retained and when they should be disposed of. It’s important for organizations to have a data retention policy not only to comply with regulatory requirements but also to reduce legal exposure, manage storage costs, and […]
Can A Disaster Recovery Plan Protect Against The Effects of Ransomware Attacks? Without a robust disaster recovery plan in place, an event like a ransomware attack can leave a business vulnerable to catastrophic data loss and disruption to operations, which may result in revenue loss, damage to reputation, and even potential legal liabilities down the road.
Three Key Aspects of Disaster Recovery Planning Disaster recovery refers to the process of recovering and restoring mission-critical data and applications during a disaster event. This process provides a way to recover and restore important data, ensures that a business’s core operations can continue to function, and aims to mitigate or avoid downtime that would disrupt internal processes and affect end users until a full recovery is completed.
S3 Data Recovery using Global Search A backup is only as good as its recovery! If you can’t recover at any time or to any location of your choice, then the backup solution is not great. In my previous post for Protection Group, I jotted down several advantages including capabilities to classify data inside your S3 buckets and only protecting data that matters to you. In this post, we will focus on how to recover data from the same Protection Groups.
Amazon S3 Data Protection using Protection Groups As highlighted in one of the recent posts for Clumio Protect for Amazon S3, customers face several challenges in order to successfully differentiate between critical and non-critical data and be able to only protect critical data. This data classification challenge is solved by Clumio using an innovative concept called Protection Groups. I’ll dive deeper into how Protection Groups […]
How To Meet Compliance Requirements for Applications in AWS Today’s compliance landscape is more complicated than it’s ever been—and it’s full of liabilities for any organization that retains user or customer data, whether workloads are hosted on-premises or in the cloud with providers like Amazon Web Services (AWS).