• Bhubaneswar India
  • Contact+ 91-9938772605
  • Mon - Sat : 10:00AM - 6:00PM

Category: technology

Quantum Corporation

Quantum Announces New Collaboration And Remote Editing Solution For Adobe Premiere Pro Users

BANGALORE, India – October 20, 2021- Quantum Corporation (NASDAQ: QMCO) today announced the immediate availability of the Quantum® Collaborative Workflow Solution powered by CatDVTM. This solution was designed specifically for Adobe® Premiere® Pro users to address the challenges of remote workflow editing and collaboration for large creative teams seeking maximum productivity. The turnkey solution is the result of months of testing and tuning to ensure that Adobe Premiere Pro customers receive a completely integrated, Quantum-tested and supported solution.

The Quantum Collaborative Workflow Solution solves the challenge of creative teams needing highly reliable and scalable offerings for teams that are increasingly dispersed, with some members working onsite in an office or studio location and some working from a remote location. The solution integrates everything needed for a comprehensive collaborative and remote workflow based on the Adobe® Creative CloudTM tool set including Adobe Premiere Pro. Quantum StorNext™ shared storage provides the workflow storage while Quantum CatDV Asset Management with included CatDV Cloud Panel for Adobe Creative Cloud delivers asset and project management and orchestration. For project archive and asset protection customers can choose their preferred asset archiving solution, ranging from Quantum Scalar® tape to Quantum ActiveScaleTM high-performance object storage, or any S3-compatible cloud storage. The complete, integrated solution is installed and supported by Quantum Professional Services and reseller partners certified to install StorNext® and CatDV.

“Collaborative teams who rely on Adobe Creative Cloud apps like Adobe Premiere Pro, After Effects, or Photoshop, need a platform that gives them the performance and flexibility to realize their vision,” said Sue Skidmore, head of partner relations for Adobe Video. “Our users value the tight integration and flexibility of environments provided by Quantum CatDV and StorNext.”

“Quantum is proud to incorporate a high level of integration with Adobe tools so that creative teams can stay productive in their workflow, yet still have a seamless, powerful interface to all of the capabilities of Quantum CatDV. This new solution incorporates the latest workflow best practices for a ready-to-use StorNext and CatDV environment that makes it easier for Adobe Creative Cloud users to love,” said Dave Clack, general manager, Cloud Software and Analytics, Quantum.

The Quantum Collaborative Workflow Solution will be installed and configured by a combination of Quantum Value Added Resellers (VARS) and Quantum Professional Services team, and is customized to each customer’s environment and needs, and choice of archiving technology and size.

The offering includes:

  • A complete, high-performance StorNext 7 collaborative shared environment tuned for both on-site and remote team members for maximum productivity
  • Installation and integration of the CatDV Panel for Adobe Creative Cloud, including Adobe Premiere Pro,
  • After Effects, and Photoshop, giving creative users access to their entire content and project asset library directly within the Adobe workflow tool of choice
  • Installation and tuning of a complete installation of CatDV Server and Worker Nodes powering automation workflows for file ingest, proxy creation, and content push and pull from shared storage to archive
  • CatDV archive plugin installation and configuration, and customer’s option of library archive storage of up to 240 TB of Quantum Scalar Tape, ActiveScale, or Cloud
  • Optional remote workstation integration for Teradici or similar services
  • All support and training included for a turnkey, ready-to-work solution

“Quantum is investing in field and technical resources in conjunction with our alliance and reseller partners to make solutions highly repeatable, reliable, and leveraging the latest field-tested best practices. We’re proud to showcase this solution for Adobe Creative Cloud teams; Customers have long asked for tested solutions like this one that are delivered as a turnkey offering yet can be highly customized to their needs,” said Christine Brennan, director of partner alliances at Quantum.

More information about the solution can be found at: https://www.quantum.com/adobe

Softline-1

Softline welcomes Omer Qureshi as VP of Strategic Alliances

LONDON, United Kingdom – October 19, 2021 – We’re excited to welcome Omer Qureshi to Softline as our VP of Strategic Alliances. Omer will play a key role in maintaining and developing our relationships with key partners. His main focus will be on further developing and strengthening our partnership with Microsoft, as well as identifying opportunities to introduce Microsoft’s cloud and cybersecurity solutions in regions where Softline is operating and growing.

Omer most recently worked with Optimus Cloud Solutions, a boutique consulting practice which he co-founded to provide cloud consulting for businesses and government organisations in the USA. Simultaneously, he held the role of head of cloud solution sales and product leader at Avaya’s startup group focused on Cloud and Ai solutions. During the time that he worked at Avaya, Omer was instrumental in helping them to make the shift from legacy IT to a leader in Cloud and AI solutions, as well as playing a pivotal role of Avaya’s IPO in 2018.

Omer is excellently positioned to add value to Softline by drawing on his experience developing Softline’s key relationships with partners like Microsoft, a company where he worked a few years back as Director of Strategic Partnerships. His track record for identifying new opportunities and building partnerships in the areas of cloud, distribution, services and OEM is sure to prove invaluable at this exciting point in the company’s expansion and future plans.

Omer’s main focus will be to facilitate growth in the company’s cloud and subscription services, while also working closely with Softline’s regional sales teams to deliver on our near-term vision for improving the business. Omer will also be playing a key role in defining and articulating new growth opportunities both within Softline and in the industries we operate.

Omer will report directly to Softline International’s President, Roy Harding and Softline Group’s Global CEO, Sergey Chernovolenko, who commented, “Softline is focused on driving growth in cloud and subscription services, as well as helping our customers to take the necessary steps towards digital transformation, and building on our partnerships with leading global vendors. We have every confidence that Omer’s experience in generating multi-million-dollar revenue growth for industry leaders such as Microsoft, VMware, and Bank of America will help us to deliver on this goal.”

Prior to joining Softline, Omer held several sales and product leadership positions focused on enterprise sales, channel development, strategic partnership and M&A. We believe that the level of ingenuity required for this role, combined with his experience with key vendors such as Microsoft, make Omer the perfect person to deliver on Softline’s vision for strategic alliances.

Omer commented on his new role at Softline, “There’s a sense of something magical in Softline’s DNA, and I’m officially fired up about this opportunity. While my primary focus will be on our strategic relationships with Softline partners, I will also be evangelizing for the brand in the US and beyond. I intend to be a vocal agent for change, bringing best practices for our continued growth and transformation. I’m looking forward to many years of success, not to mention celebrating that success with you all!”

Omer plays an active role in several community initiatives for underprivileged youths and other causes. He also serves on the boards of several startups and nonprofits in his hometown of Seattle. In his free time, he enjoys reading, travelling, and spending time with his wife and three children.

About Softline Group

Softline facilitates digital transformation and cybersecurity services to customers from 50+ countries and in almost 100 cities around the world. Our near than 2,600 highly-motivated sales and marketing specialists (c. 45% of the Group’s FTEs), and around 1,900 engineers, developers and other IT experts (33% of the Group’s FTEs), engage with our clients to choose and integrate the right products in the most efficient way, creating and managing hybrid and secure infrastructures. Hand-in-hand with our clients, our global support and maintenance teams manage and support the infrastructure needed to underpin world-class digital transformation, cloud-based services and rock-solid cybersecurity.

Today, with over 25 years of experience, around 6,000 worldwide employees and a turnover in 2020 of $1.8 billion, Softline is a leading global provider of digital transformation, cloud services, cybersecurity and related solutions & services. Thanks to our more than 6,000 vendors, we have helped upwards of 150,000 small, medium, and large enterprise businesses from the private and public sectors transform their business into the digital world.

Softline’s goal is to help you improve your business performance, and your quality of life through the most effective use of technology.

For more information, please visit www.softline.com.

Filip Cotfas

What is Insider Data Exfiltration?

Mr. Filip Cotfas, Channel Manager, CoSoSys

Data exfiltration refers to the unauthorized copying, transfer, or retrieval of data from a company computer or server. It can be performed by a variety of actors: by outsiders through malware or phishing attacks that can lead to data breaches, by malicious insiders looking to inflict harm on an organization for their own or other entities’ gain, or by careless insiders who leak data by accident. Most often, data exfiltration is a deliberate attempt to appropriative sensitive and valuable data.

Types of Data Exfiltration

There are several ways in which data is exfiltrated on-site by malicious insiders. The most common method, is outbound emails. Legitimate users attach files containing sensitive data to emails and send them to their personal email accounts. They can also copy-paste sensitive information directly into the body of emails or forward confidential internal communications to their own or competitors’ email addresses.

The second most popular data exfiltration method is uploading sensitive data to cloud storage websites.  Information can be exfiltrated from cloud storage when data is uploaded to insecure or misconfigured services. Misconfiguration in particular is a common cause for data leakage when uploaded files are accidentally left exposed to the public. Malicious insiders may also intentionally misconfigure services to give access to unauthorized third parties or make files accessible to themselves from a personal device. Uploading sensitive information to personal cloud drives from company computers is also a frequently used data exfiltration technique.

Another common data exfiltration method is the use of unauthorized removable devices to copy confidential files. Insiders can download sensitive data from the corporate network and store it locally on their work device. Those files can then easily be copied onto USBs or other removable devices connected to the computer. This technique allows employees to steal data without requiring internet or network connection. In fact, by taking their devices offline, insiders can sometimes bypass security policies in place against this type of data theft.

Preventing Data Exfiltration

Sensitive data classification is essential for effective data exfiltration threat detection. While most organizations will flag categories of data such as personally identifiable information (PII) safeguarded under data protection legislation, as sensitive, they often disregard other categories of data that could be deemed sensitive in the context of their industry.

It is therefore important that companies evaluate the data they produce and identify which categories are critical to their business operations and which need to be protected to vouchsafe their competitive advantage. Once these types of data are discovered, organizations can put security controls in place to protect them.

Data Loss Prevention (DLP) solutions, that allow sensitive data to be defined based on a company’s needs, can be used as part of cybersecurity strategies to ensure data security. DLP tools come with predefined profiles for common types of protected information such as PII and intellectual property but also allow for customizable policies to suit a particular organization’s requirements. Once sensitive data is defined, DLP solutions monitor and control its transfer and use.

By monitoring sensitive data and logging any attempts to violate policies, DLP tools allow security teams to spot suspicious user activity and identify employees acting with malicious intent. DLP technology is particularly useful against the two most popular data exfiltration techniques: it can block files containing sensitive information from being transferred to personal email addresses or cloud storage services and even prevents confidential information from being copy-pasted into the body of an email.

When applied on the endpoint, DLP solutions such as Endpoint Protector can also ensure that its policies remain active on a work computer whether it is in the office, used remotely, and regardless of whether it is connected to the internet or not.

Insider data exfiltration is a real threat to company data security and organizations wishing to protect their most valuable data must look for ways to mitigate it. While this can prove a daunting task because it involves insiders with privileged access to confidential information, tools such as DLP solutions can help companies avoid data theft through exfiltration.

pexels-luis-gomes-546819-software

Keysight Delivers New IoT Security Assessment Test Software

Bangalore, October 14, 2021 – Keysight Technologies, Inc. (NYSE: KEYS), a leading technology company that delivers advanced design and validation solutions to help accelerate innovation to connect and secure the world, has delivered a new Internet of Things (IoT) Security Assessment software solution that enables IoT chip and device manufacturers, as well as organizations deploying IoT devices, to perform comprehensive, automated cybersecurity assessments.

Increasing numbers of connected IoT devices enable hackers to leverage cybersecurity vulnerabilities for a range of attacks including malware, ransomware and exfiltration of data. According to Statista, the total installed base of IoT connected devices worldwide is projected to grow to 30.9 billion units by 2025 from 13.8 billion units expected in 2021.

“IoT device vulnerabilities are especially dangerous as they can facilitate sensitive data breaches and lead to physical danger, such as industrial equipment malfunction, medical device defects, or a home security system breach,” wrote Merritt Maxim, vice president, research director, and Elsa Pikulik, researcher, Forrester, in the State of IoT Security Report 2021.1 “In 2020, IoT devices were the second most common vector for an external breach and technology leaders rank security issues as a top concern plaguing or hindering IoT deployments.”

IoT Security Vulnerabilities – BrakTooth Discovery

Recently, researchers at Singapore University of Technology and Design (SUTD) discovered a group of vulnerabilities, they named BrakTooth, in commercial Bluetooth chipsets that impact billions of end-user devices. The SUTD research was funded with a grant from Keysight. The SUTD published results were leveraged into improvements in Keysight’s IoT Security Assessment software.

BrakTooth captures fundamental attack vectors against devices using Bluetooth Classic Basic Rate/Enhanced Data Rate (BR/EDR) and is likely to affect Bluetooth chipsets beyond those tested by the SUTD team. “It is hard to accurately gauge the scope of BrakTooth affected chipsets,” commented Sudipta Chattopadhyay, assistant professor, SUTD. “We advise all Bluetooth product manufacturers to conduct appropriate risk assessments, especially if their product may include a vulnerable chipset. We are thankful to Keysight for generously supporting our research and the opportunity to collaborate with the experienced Keysight security team.”

The vulnerabilities, which include 20 common vulnerabilities and exposures (CVEs), as well as four awaiting CVE assignments, are found in Bluetooth communication chipsets used in System-on-Chip (SoC) boards. These pose risks that include remote code execution, crashes and deadlocks. The SUTD team responsibly disclosed the findings to the affected vendors, providing a means to reproduce the findings and time to remediate vulnerabilities.

“Research activities like these at SUTD are critical to improving cybersecurity in the connected world. If the good guys don’t improve it, the cyber criminals will take advantage of vulnerabilities for nefarious purposes,” said Steve McGregory, senior director of Keysight’s security research and development team. “While investment into research is needed and helpful, software and chipset manufacturers are responsible for delivering secure products using rigorous security testing.”

Keysight’s IoT Security Assessment Software

Keysight’s IoT Security Assessment software leverages more than 20 years of experience in network security testing to reveal security vulnerabilities across any network technology. The software offers comprehensive, automated testing to rapidly cover a large matrix of known and unknown vulnerabilities. IoT security assessments include novel cybersecurity attack tools and techniques for wireless interfaces such as Wi-Fi, Bluetooth, and Bluetooth Low Energy (BLE) to test known vulnerabilities, as well as to discover new vulnerabilities.

Development organizations can easily integrate Keysight’s API-driven solution into their development pipeline with a single API for control and reporting. Organizations deploying IoT devices can leverage the software to validate IoT devices before they are delivered to end users and as new vulnerabilities become a concern. Ongoing research from Keysight’s Application and Threat Intelligence Research Center provides updates to the latest protocol fuzzing and attack techniques.

1Forrester, The State of IoT Security, 2021, by Merritt Maxim, Elsa Pikulik with Stephanie Balaouras, Chris Sherman, Benjamin Corey, Peggy Dostie

About Keysight Technologies

Keysight delivers advanced design and validation solutions that help accelerate innovation to connect and secure the world. Keysight’s dedication to speed and precision extends to software-driven insights and analytics that bring tomorrow’s technology products to market faster across the development lifecycle, in design simulation, prototype validation, automated software testing, manufacturing analysis, and network performance optimization and visibility in enterprise, service provider and cloud environments. Our customers span the worldwide communications and industrial ecosystems, aerospace and defense, automotive, energy, semiconductor and general electronics markets. Keysight generated revenues of $4.2B in fiscal year 2020. For more information about Keysight Technologies (NYSE: KEYS), visit us at www.keysight.com.

Mr. Sushant Gupta_Founder & CEO_SG Analytics

SG Analytics receives GPTW certification in its maiden attempt

Pune, October 13, 2021 – SG Analytics, a market leader in data-driven research and contextual analytics services, has been certified as a ‘Great Place to Work (GPTW)’ in its maiden attempt. The Great Place to Work Institute uses a rigorous and objective methodology to assess and benchmark organizations from over 60 countries every year.

This prestigious recognition is awarded solely on the basis of employee feedback and their experience working at an organization.

“This global certification is a testament to our resolve of building a ‘source company’, wherein everybody is successful and content. It also reflects our accountability-oriented workplace that nurtures performance, growth, and appreciation. Congratulations to all my colleagues for us being certified as a ‘Great Place to Work (GPTW),” says Sushant Gupta, Founder & CEO, SG Analytics.

Vineet Agarwal, CO-CEO, SG Analytics adds further, “It is heartening to see that even during such trying times, our people continued to be upbeat, committed, and positive, in their belief that SG Analytics is a great place to work for them. What helped us through this difficult year is the resilience of our people and the support of our clients, as well as our values of excellence, co-creation, accountability, leadership and fun. For this, we are grateful and would like to congratulate everyone for embodying the spirit of SGA.”

SG Analytics has remained consistent in its efforts towards employee welfare in a very holistic way. Earlier this year, SG Analytics announced and institutionalized a profit-sharing plan for all employees, and also introduced a path-breaking policy of leave-sharing, reflecting its unique employee-oriented approach.

Sandeep Dutta, Head of HR & Admin, SG Analytics says, “For all of us at SGA, it is a great honour to have been certified the industry coveted ‘Great Place to Work’ in the first attempt. The GPTW certification is special to us because it is based on trust index, culture audit, and anonymous feedback from our valued team members who, through their direct ‘feedback’ tell the story SG Analytics, unfiltered.”

SG Analytics conducted two major hiring drives during the pandemic to onboard talented professionals when many companies were laying off their staff.

About SG Analytics

SG Analytics, is one of the leading research and analytics firms to offer data-centric research and contextual analytics services to companies across BFSI, Media & Entertainment, Technology & Healthcare sectors including Fortune 500 companies. With its presence in the US, the UK, Switzerland, and India, SG Analytics has been consistently meeting and exceeding customer expectations through its knowledge-based ecosystem and impact-oriented solutions. The company serves across a strong portfolio of Fortune 500and other clients. With the philosophy of a ‘source company’ at its center, the firm has been able to create a dynamic and growth-oriented environment at the workplace for over 950+ employees, enabling it to become a Great Place To Work (GPTW) certified company.

Satnam Narang_Staff Research Engineer_Tenable

Microsoft’s October 2021 Patch Tuesday Addresses 74 CVEs

Microsoft patched 74 CVEs in the October 2021 Patch Tuesday release, including three rated as critical, 70 rated as important and one rated as low. This is the eighth month in 2021 that Microsoft patched fewer than 100 CVEs. Spoofing vulnerability (CVE-2021-36970) in the Windows Print Spooler received a CVSSv3 score of 8.8 and the designation of “Exploitation More Likely” according to Microsoft’s Exploitability Index. This vulnerability requires that an attacker have access to the same network as a target and user interaction. The advisory lists that a functional exploit does exist for this vulnerability so we may see a PoC circulating in the wild. Please find further comment on this month’s Patch Tuesday from Satnam Narang, Staff Research Engineer, Tenable.

“This month’s Patch Tuesday release includes fixes for 74 CVEs, three of which are rated critical, including one vulnerability that was exploited in the wild as a zero-day. This month’s release includes a fix for CVE-2021-36970, a spoofing vulnerability in Microsoft’s Windows Print Spooler. The vulnerability was discovered by researchers XueFeng Li and Zhiniang Peng of Sangfor. They were also credited with the discovery of CVE-2021-1675, one of two vulnerabilities known as PrintNightmare. While no details have been shared publicly about the flaw, this is definitely one to watch for, as we saw a constant stream of Print Spooler-related vulnerabilities patched over the summer while ransomware groups began incorporating PrintNightmare into their affiliate playbook.

“We strongly encourage organisations to apply these patches as soon as possible. Microsoft also patched CVE-2021-40449, an elevation of privilege vulnerability in Win32k. According to reports, this flaw was exploited in the wild as a zero-day. It is not uncommon to see zero-day elevation of privilege flaws patched during Patch Tuesday. These flaws are most valuable in post-compromise scenarios once an attacker has gained access to a target system through other means, in order to execute code with elevated privileges.” – Satnam Narang, Staff Research Engineer, Tenable

Softline-1

Softline ActivePlatform is now available on Microsoft’s AppSource Marketplace

LONDON, United Kingdom – October 12, 2021 – Microsoft has introduced ActivePlatform, a brokering portal for cloud service sales by Softline Group, to its AppSource Marketplace, raising the platform’s visibility and helping customers to compare its advantages with other solutions on the market.

Before AppSource was added, the platform’s authorization procedure was simplified to speed up the onboarding process for new customers. The target audience (which includes Microsoft CSP partners, such as resellers and distributors) will now be able to request a trial of ActivePlatform to get a feel for how the solution works.

“Microsoft’s input is of great importance to us, and these changes have definitely made the platform more accessible for resellers. We’re looking forward to developing the service further and improving integration for new vendors. In fact, we have recently launched the SaaS version, which means that now the platform is even more affordable for our smaller customers.

An ever-growing number of vendors are embracing the subscription business model, so automating the customer lifecycle (particularly sales, billing, and integration with ERP systems) is clearly becoming key to success in the market. This solution offers an effective way to automate customer journeys, while also bringing down transaction costs and increasing profits,” commented Softline ActivePlatform’s CEO, Dmitry Levkovich.

About ActivePlatform

ActivePlatform is part of Softline Group, a leading global IT solutions and services provider in digital transformation and cybersecurity. The platform offers a full-service automated cloud brokering solution for cloud service providers and internal IT hubs which aims to make it easier to manage cloud delivery and profitability. The platform brings vendors, providers, developers, and resellers together in one ecosystem for buying, selling, and managing cloud services. Through its open vendor integration framework, ActivePlatform offers businesses a comprehensive catalog of the cloud services they need in order to thrive.

ActivePlatform can be used for SaaS, PaaS, IaaS aggregation, delivery, and monetization. The user-friendly platform also provides insights into how resellers and cloud services are using services.

ActivePlatform is headquartered in Minsk, Belarus and provides solutions for distributors, cloud solution providers, and telecom operators.

pexels-luis-gomes-546819-software

Prodevans Technologies announced a new partnership with UK based software company Canonical

Bangalore, 7th October 2021: Prodevans Technologies a Bangalore and Singapore based leading technology solution provider specializing in end-to-end DevOps and fullstack cloud solutions announced a new partnership with Canonical focused on simplifying and improving high availability across multicloud architectures, consisting of common public cloud infrastructure and cost-effective private cloud.

“Ever increasing demand for multi-cloud architectures is driven by organizations constantly trying to optimize their infrastructure costs to make sure that they only use as many resources as needed and pay less for them.” says Devesh Mohan, director of Alliances at Canonical. “Prodevans comprehensive cloud expertise will support our solutions to help companies of all sizes and across industry segments to harness the power of open-source cloud computing.”

Canonical solutions deliver significant cost reduction of cloud computing. However, the risk associated with planned or unplanned downtime is an area of critical importance as enterprises move towards open source. The partnership is such a natural fit since Prodevans is already using Canonical’s solutions to support its multicloud platforms.

“With this partnership, Prodevans can help our customers enable a faster, simpler path to cloud that delivers solutions with lower TCO along with the much needed flexibility to adapt their cloud infrastructure to the future.” says Gagan Pattanayak, CEO, Prodevans, Singapore “We believe we are just enablers, assisting companies in building a cloud strategy that works for business today, tomorrow and into the future as the business evolves”.

Together, Canonical and Prodevans can offer a unified cloud management framework as a one-stop solution to manage all customers’ cloud infrastructure, reducing costs, improving security, and providing the most up to date access to the fullstack features.

About Prodevans: Prodevans is a leading technology solution provider specialized in end-to-end DevOps offerings that streamline and automate IT delivery. We specialize in the entire spectrum of Cloud Solutions from IaaS, PaaS to StaaS. We strive to provide solutions that are time-driven and efficient with a stringent focus on ROI. Prodevans helps companies deliver a great customer experience by deploying the right cloud-based tools and resources. Learn more: www.prodevans.com

Synology

Synology® released data protection cloud backup service for Windows devices

Taipei, Taiwan—Oct 8, 2021—Synology Inc. today announced the launch of its newest Synology C2 cloud application. C2 Backup provides powerful and efficient data protection for Windows devices, whether they are located at home or distributed across multiple offices.

“With C2 Backup, we provide a fresh alternative for those who want to centralize protection of their devices, wherever they are,” said Yen-ju Lin, Product Manager for C2 Backup at Synology Inc. “It is easy to set up and use, and requires no additional hardware to protect Windows devices, allowing users to start backing up today.”

Complete and centralized data protection

With C2 Backup For Individuals and C2 Backup For Businesses, everything on Windows PCs and servers can be securely and efficiently backed up from a single console. This includes system configurations and software, files and folders, and external drives.

Data backed up on C2 Backup is fully shielded against unauthorized access by end-to-end AES-256 encryption, with a user-held private key necessary to unlock backup files and sensitive information.

Graph I. C2 Backup is fully shielded against unauthorized access by end-to-end AES-256 encryption, with a user-held private key necessary to unlock backup files and sensitive information.

Flexible ways to schedule backups

C2 Backup makes use of forever-incremental backup to optimize storage and bandwidth.
Incremental backup reduces the amount of data uploaded for every backup to only those blocks that have changed, making backups more efficient.

Each subscriber can set their own individual version retention preferences. Retention policies can be tailored to meet individual needs or comply with corporate policies and regulations.

Finally, C2 Backup offers scheduling strategies to make sure that users never miss a backup. Users can choose to periodically execute backup tasks, or they can let them be triggered by events such as screen locking, account logout, or device power-up.

Fast and full restoration options

In the event of device failure, data loss, or ransomware attacks, C2 Backup’s fast recovery methods allow users to quickly resume services. File-level recovery allows you to retrieve any file you need immediately, while entire devices can be restored to their previous state with bare-metal recovery.

“Individual device owners can easily find and quickly download their backed up data all by themselves by accessing the intuitive C2 Backup console,” Ms Lin said. “Clear versioning also allows users to retrieve older copies of their files from the portal when needed.”

Graph II. File-level recovery allows you to retrieve any file you need immediately, while entire devices can be restored to their previous state with bare-metal recovery.

Unlimited endpoints and transparent pricing

Pricing for C2 Backup For Individuals is based on storage use, with no limit to the number of devices protected under each subscription. Annual subscription rates start at $3.49 per month for 500 GB of backed up data or under $8.50 per month to protect up to 2 TB.

Availability

C2 Backup is offered in two subscription plans: C2 Backup For Individuals and C2 Backup For Businesses.

Users who register for C2 Backup For Individuals until the end of 2021 are offered an extended 90-day free trial period, allowing them to thoroughly test the new platform’s capabilities.

C2 Backup For Business will additionally let Microsoft 365 users back up data stored on Exchange Online. If you are interested in the features of C2 Backup for Business, learn more on Synology C2 page.

Try the capabilities of C2 Backup for FREE with our extended 90-day free trial, valid until the end of 2021: https://sy.to/c2backupprin