Quest Rapid Recovery 6.2 is now available!
Announcing Quest Rapid Recovery 6.2 is now available As all technologies evolve and change, Rapid Recovery evolves to keep pace — and to keep them better protected. Based on valuable customer and part...
Announcing Quest Rapid Recovery 6.2 is now available As all technologies evolve and change, Rapid Recovery evolves to keep pace — and to keep them better protected. Based on valuable customer and part...
Did you think virtualizing your IT infrastructure would put an end to your systems management woes? If so, you are not alone. While it’s true that you now have less hardware, less storage housed on ac...
First things first. What is data archiving? Simply put, it’s a process that takes data that’s no longer in use or has lost its relevance and moves it to lesser expensive storage such as magnetic tape...
The new Quest Data Protection Portal is now online and available! Gain end-to-end visibility of all data protection activities across your entire IT environment anywhere, anytime. The Quest Data Prote...
Chico: “You call this a barn? This looks like a stable.” Groucho: “Well, if you look at it, it’s a barn; if you smell it, it’s a stable.” From “Monkey Business,” by the Marx Brothers That’s the way ...
Rod Stewart. Jay Leno. Jennifer Lopez. Blue Man Group. Cirque du Soleil. Quest Software. What do these have in common? They’re all be putting on shows in Las Vegas during August. And while you may not...
My feet hurt. I’m tired of wandering the floor. Who’s got the best giveaways and Microsoft expertise at Inspire? We don’t want to toot our own horn, but…toot, toot! Our giveaways are on point! We’re ...
Acabamos de presenciar uno de los ataques de ransomware más devastador y público jamás registrado. El viernes 12 de mayo de 2017, aproximadamente 200.000 damnificados en 150 países fueron víctimas de...
We’ve just witnessed one of the most devastating ransomware attacks ever recorded. Last Friday, an estimated 200,000 computers across 150 countries were victims of a global ransomware attack on an un...
Part one of this blog series may be found here Note: This blog series was supposed to be divided in 3 parts. However, some readers were gracious enough to ask me to publish all remaining material in o...
Part two of this blog series may be found here A few days ago, I was working with a MSP customer that had the same issue on multiple Exchange servers hosted by his own customers. Specifically, in that...
How do I get my data offsite? One of the most important items in a good backup and disaster recovery strategy is making sure that data is redundantly stored at a location beyond just the primary site....