VAST Perspectives
Harnessing the Power of Artificial Intelligence in IT Operations
Artificial intelligence (AI) has been front-page news in the last several years. The technology is rapidly maturing and offering new applications and services across a wide range of disciplines. Generative AI products such as ChatGPT have garnered a lot of headlines...
Trends and Predictions in the Evolution of Cloud Computing
Commercial cloud computing is a dynamic field that has undergone substantial evolution during its short history. Since its inception with the launch of Amazon’s Elastic Computer Cloud (EC2) in 2006, cloud computing has grown to become a major force in the world of...
Understanding the Importance of Disaster Recovery Planning for Business Continuity
Business continuity is an essential concept for companies operating in today’s challenging threat environment. Companies need comprehensive business continuity planning to protect themselves from the impact of an extended outage. The loss of IT systems for an extended...
Leveraging Microsoft 365 Conditional Access Policies for Enhanced Identity Security
Providing effective identity and access management (IAM) is one of the major challenges facing today’s businesses and their IT teams. They need to implement robust policies to protect mission-critical applications and valuable data resources while simultaneously...
Why You Need to Understand Existing Infrastructure For Cloud Success
Many organizations have plans to migrate some or all of their IT environment to a cloud provider. They may be planning to move from an on-premises data center to the public cloud. In some cases, companies already have a cloud presence and want to expand it or...
Countdown to World Backup Day and Why You Should Care
Backups are an important, but sometimes overlooked, ingredient of an effective strategy to protect a company’s valuable data resources. March 31st is designated as World Backup Day to draw attention to this essential component of managing an IT environment. If your...
Ransomware Prevention and Protection Tips
Ransomware is a particularly virulent form of malware that attacks business-critical systems and data. Ransomware attacks encrypt files or lock systems, rendering them useless to their owners. Typically, the threat actors behind the attack demand a financial ransom to...
How to Keep Your Data Safe from Cyber Threats
In today’s competitive business world, a company’s data is often its most valuable asset. Access to the information an organization collects, processes, and stores is necessary for maintaining operations and serving customers. The loss or corruption of this important...
What Is Copilot For Microsoft 365? We Let Copilot Do the Talking
Business objectives and requirements are continuously evolving and companies can often address them with cutting-edge technological solutions. Many organizations find it difficult to stay up-to-date with the technology that can help them run their business...
Cohesity to Acquire Veritas’ Data Protection Business
Cohesity, a leading data security and management firm, has announced its definitive agreement to acquire Veritas' data protection business, consolidating into a single entity valued at approximately $7 billion. Sanjay Poonen, current CEO of Cohesity, will lead the...