Featured

How to Recover from a Ransomware Attack

There are a number of security vulnerabilities that expose organizations to ransomware. Here is how ransomware gets in and what organizations can do to recover successfully and quickly from an attack.

Length: 3:03

Solution: Converged Data Protection

Data Protection for SaaS Applications: The Hidden Risks

User error, departing employees or malicious attacks put your organization at risk for permanent data loss within SaaS applications like Office 365, G Suite and Salesforce.

Length: 2:31

Solution: Converged Data Protection

Leveraging the Cloud to Speed eDiscovery While Reducing Risk and Cost

Legal hold data requests today expand far beyond traditional email server requirements. As data volumes increase, Legal and IT teams can no longer continue to rely on legacy eDiscovery processes that are both inefficient and costly.

Length: 8:24

Solution: Converged Data Protection

Customer Spotlight: LACCD, CNSI, CLEAResult

Watch our customer spotlight video to hear about some of our customers' firsthand experiences with inSync.

Length: 3:39

Solution: Endpoint & Cloud Backup

Druva Tech Moments: Deduplication Explained

Three things about deduplication you ought to know: Location, Logic, and Scale. What do they mean? And how does it work?

Length: 4:37

Solution: Endpoint & Cloud Backup

Druva Tech Moments: Elastic Cloud Platform Architecture

Dave Packer, from Druva product team, goes under the hood to explain Druva unique elastic cloud architecture which is the foundation of both inSync and Phoenix.

Length: 6:59

Solution: Converged Data Protection

Druva Tech Moments: Full Text Search Indexing

Dave Packer from Druva's product team explains full text searching indexing, a fundamental part of Druva's unique elastic cloud architecture. With full text indexing, businesses can gain greater insight on available data to understand data at risk and address compliance requirements.

Length: 8:24

Solution: Converged Data Protection

Druva Tech Moments: Split Key Encryption Explained

Dave Packer, from our inSync product team, takes a moment to explain Druva's approach to encryption using the two factor encryption model.

Length: 7:19

Solution: Endpoint & Cloud Backup

ESG Data Protection in a BYOD World

One of the most complicated areas of data protection in IT today has to be around securing the data on endpoint devices (laptops and tablets).

Length: 8:15

Solution: Data Protection for BYOD

Gartner: How to Build a Successful Governance Strategy

Gain expert advice to help you create a successful program for data governance from Sheila Childs, Managing VP at Gartner.

Length: 21:17

Solution: eDiscovery for Endpoints