What's New in NAKIVO Backup & Replication v10.8: Release Overview Release
02.11.2023
Cisco acquires Splunk, but how do you convince Splunk customers that Cisco has advantages
01.11.2023
CrowdStrike provides 100% coverage according to the MITRE Engenuity ATT&CK® Evaluations: round 5
31.10.2023
Top 20 Shocking Data Breach Statistics for 2023
06.09.2023
Adversaries Can “Log In with Microsoft” through the nOAuth Azure Active Directory Vulnerability
06.09.2023
iIT Distribution is the official distributor of LogRhythm!
31.08.2023
Instant replication with NAKIVO Backup & Replication v10.10 Beta
03.08.2023
Effective communication: Email vs. Instant Messaging?
25.07.2023
Infinidat Expands Support for Hybrid Cloud Storage Deployments with InfuzeOS Cloud Edition
14.07.2023
Falcon Insight for ChromeOS: The Industry’s First Native XDR Offering for ChromeOS
03.06.2023
Opening new horizons: iIT Distribution is the official distributor of Gatewatcher
13.05.2023
Another revolution in cybersecurity from CrowdStrike: top 5 important things to know about Managed XDR (MXDR)
09.05.2023
GTB Technologies is the best solution in the DLP industry
04.04.2023
CrowdStrike Falcon Platform Detects and Prevents Active Intrusion Campaign Targeting 3CXDesktopApp Customers
24.03.2023
Labyrinth Deception Platform v2.0.51: Release notes
23.03.2023
SIEM vs Log Management Systems: What you need to know before choosing
15.03.2023
CrowdStrike Falcon Named the Winner of the 2022 AV-TEST Award for Best MacOS Security Product
10.03.2023
CrowdStrike 2023 Global Threat Report: Resilient Businesses Fight Relentless Adversaries
10.03.2023
Threema Work App Update: Encrypted Group Calls Are Now Available on Android Devices
28.02.2023
CrowdStrike Ranked #1 in the IDC Worldwide Endpoint Security Market Shares Report for Third Time in a Row
21.02.2023
Picus Red Report 2023: The Top 10 Most Prevalent MITRE ATT&CK Techniques Used by Attackers
14.02.2023
On leadership in the sphere of high-end unified storage: An exclusive interview with Phil Bullinger, CEO of Infinidat
11.02.2023
Securing PostgreSQL from Cryptojacking Campaigns in Kubernetes
30.01.2023
What's New in NAKIVO Backup & Replication v10.8: Release Overview
16.01.2023
Success Story: Georgian Bank Achieves 100% Backup Success Rate with NAKIVO
12.01.2023
CrowdStrike Named a Leader in Frost & Sullivan’s 2022 Frost Radar for Cyber Threat Intelligence
12.12.2022
DDoS Attack Prevention and DDoS Protection Best Practices
21.11.2022
How Hackers Can Bypass Multi-Factor Authentication
08.11.2022
CrowdStrike Achieves Red Hat OpenShift Certification: Streamlining Visibility and Automating Protection for OpenShift
03.11.2022
Infinidat Recognized as a Leader in Gartner Magic Quadrant for Primary Storage – 5th Year in a Row
19.10.2022
New version of NetBrain Release 11: the key to reducing the cost of NetOps
13.10.2022
With security revenue surging, CrowdStrike wants to be a broader enterprise IT player
05.10.2022
CrowdStrike Announced the Acquisition of Reposify to Bolster Visibility and Reduce Risk Exposure of External Assets
22.09.2022
Kubernetes против Docker: в чем между ними разница?
16.09.2022
Infinidat расширяет функции NVMe/TCP для сред VMware
15.09.2022
Новые возможности InfiniBox от Infinidat: vVols репликация для VMware сред
02.09.2022
Индикаторы атак на основе искусственного интеллекта позволяют максимально быстро прогнозировать и останавливать угрозы
03.08.2022
Истории с Dark Web: Отслеживание подпольной экономики eCrime улучшает эффективность киберзащиты
22.07.2022
Развитие ботнетов и DDoS-атак
15.07.2022
Lookout обнаружила шпионское ПО для Android, развернутое в Казахстане
11.07.2022
Выявление и смягчение атак NTLM-ретрансляции, нацеленных на контроллеры домена Microsoft
20.06.2022
Что такое демократизация данных?
07.06.2022
Неизменные резервные копии: что вам нужно знать, чтобы защитить свои данные
22.05.2022
Украинские Киберактивисты Использовали Скомпрометированные Docker Honeypots Для Антироссийских Dos-Атак
06.05.2022
ЧТО НОВОГО В LABYRINTH DECEPTION PLATFORM: РЕЛИЗ 2.0.32
22.04.2022
PALO ALTO NETWORKS проинформировала об уязвимостях, которые могут разрешить злоумышленникам отключить платформу CORTEX XDR
15.04.2022
INSPUR ВТОРОЙ ГОД ПОДРЯД СТАНОВИТСЯ ОБРАЗЦОВЫМ ПОСТАВЩИКОМ CLOUD-OPTIMIZED ОБОРУДОВАНИЯ ПО ВЕРСИИ GARTNER HYPE CYCLE
08.10.2020
Intelligent IT Distribution взяла участь у Третьому щорічному Міжнародному Форумі «Кібербезпека - Захистимо Бізнес, Захистимо Держава»
29.09.2020
iITD - партнер форуму “Кібербезпека - захистимо бізнес, захистимо державу” 2020
24.09.2020
Компанія IIT Distribution отримала статус дистриб’ютора рішень NetBrain Technologies на території України
28.08.2020
Fal.Con 2020 від CrowdStrike
25.08.2020
Дотримання норм страхування кіберризиків
25.08.2020
Автоматично блокуйте скомпрометовані облікові записи з Lepide Active Directory Self Service 20.1
25.08.2020
Компанія Cossack Labs запрошує відвідати NoNameCon
22.07.2020
Підписання дистриб’юторської угоди з компанією Safe-T
21.07.2020
Міжнародна конференція: "Online Banking - Час інновацій!"
18.06.2020
Глобальний звіт про кіберзагрози 2020
11.06.2020
Четвер, 25 червня 2020 року. Не пропустіть!
05.05.2020
Анонс: нова версія Acra Enterprise забезпечує підвищену гнучкість для високонавантажених систем
13.04.2020
Lepide Remote Worker Monitoring Pack - легка платформа безпеки, яка гарантує негайний захист даних бізнесу протягом непередбаченого періоду віддаленої роботи.
12.04.2020
Забезпечення кібербезпеки для віддалених користувачів
08.04.2020
Labyrinth Technologies пропонує скористатися спеціальною пропозицією - ліцензія на 12 місяців за ціною 6 місяців.
07.04.2020
«CrowdStrike: дистанційна робота та ІТ-безпеку за часів кризи - скорочена ліцензійна програма на 3-6 місяців».
23.03.2020
Компанія iIT Distribution отримала статус дистриб’ютора рішень RedSeal Networks на території України.
23.03.2020
Компанія iIT Distribution отримала статус дистриб’ютора рішень Lepide на території України.
16.03.2020
Компанія iIT Distribution починає дистрибуцію рішень CrowdStrike на території України.
19.02.2020
20 лютого у Києві відбудеться щорічна конференція CISO DX DAY 2020
18.02.2020
Компанія iIT Distribution отримала статус дистриб’ютора рішень Instana на території України.
17.02.2020
Exabeam Security Intelligence Platform допомагає
NAKIVO has recently released a new version of its Backup & Replication platform, version 10.8. NAKIVO Backup & Replication is a fast, comprehensive, reliable and affordable solution for protecting physical, virtual and cloud infrastructures, as well as work environments with strict data protection requirements. The solution allows you to seamlessly backup Windows or Linux Server, ensuring consistency of application and database data.
This release includes a comprehensive MSP console for managing individual instances of the solution as remote tenants, full support for vSphere 8 GA, and support for S3-compliant object storage.Version 10.8 also includes numerous usability and management improvements aimed at optimizing data protection and reducing management complexity.
Here is a detailed overview of the new features of the latest release of the NAKIVO Backup & Replication platform:
MSP Console
MSPs and enterprises with multi-tenant deployments of NAKIVO Backup & Replication can now manage remote as well as local tenants. A remote tenant is any standalone deployment of the NAKIVO solution.
Previously, you could create new tenants in the dashboard of your own multi-tenant deployment to manage and monitor their data protection infrastructure. Now you can also add standalone instances of NAKIVO Backup & Replication to your multi-tenant instance as remote tenants.
With the new MSP console in v10.8, you can now monitor and manage all tenants – both remote and local – and from the same dashboard. Once added to the solution, a remote deployment is just another tenant, and you gain easy access to their data protection activities and infrastructure components.
This feature aims to improve productivity and streamline administration for MSPs offering BaaS and DRaaS, as well as for large enterprises with separate departments or offices.
vSphere 8 GA Support
New VMware releases are some of the most anticipated events in the industry. The latest vSphere v8 introduces several interesting features, including digital processing units (DPUs) to offload server CPUs and enhance edge and cloud workload performance.
At NAKIVO, we’ve always been ahead of the pack with support for the latest vSphere versions, and this VMware release is no exception. We delivered compatibility with the vSphere 8 initial availability (IA) release in our 10.7.2 update as soon as that release was announced. We’re now following up with full vSphere 8 GA support in v10.8.
Now you can use NAKIVO Backup & Replication to protect workloads in the latest version of the VMware virtualization platform with backup, replication and disaster recovery features. This allows you to benefit from the latest innovations in virtualization while maintaining reliable data protection with fast backups, reliable recoveries and optimal RTOs with NAKIVO.
S3-Compatible Object Storage Support
Our releases this year have already expanded the public cloud targets available as backup repositories in NAKIVO Backup & Replication. You can already add repositories in Amazon S3, Wasabi Hot Cloud Storage, Azure Blob Storage and Backblaze B2, with the option to protect backups in the cloud against ransomware infections with immutability.
The new v10.8 feature is designed to reap the benefits of hybrid cloud environments. It allows you to store backups in local storage compatible with the S3 API and choose from a variety of cost-efficient platforms that fit your organization’s needs.Set up on-premises storage to minimize latency and stay in complete control of your data. Enable immutability for recovery points for reliable protection from ransomware infections and accidental data deletions.
Usability and Management Improvements
The new version also introduces some enhancements to existing features. These are important improvements to make a sysadmin’s data protection tasks easier and less time-consuming.
Improved backup retention
Currently, the backup creation wizard in the NAKIVO solution provides scheduling and retention settings as two separate steps. This approach shows you the schedule of your backups and then allows you to set retention settings, including with the help of the grandfather-father-son (GFS) rotation scheme.
Now you can switch to the new simplified wizard for configuring job schedules and retention settings in one step and in a single view. Fine-tune retention of backups with the new configuration wizard. Specify retention settings for each schedule within a backup or replication job and set expiration dates for recovery points for more granular control.
Job priority
The order in which you create data protection jobs shouldn’t determine the priority in which these jobs are processed. With 10.8, you can set the priority level for critical backup jobsto be processed first in the queue and ensure they are completed on time.
Jobs will be assigned the lowest priority level (5) by default. You can then assign priority levels 1–5 to ensure that high-priority jobs (level 1) get the solution resources they need as soon as they become available to be processed first.
Merge jobs
We’ve all had new objects added to a workload that is already in the process of being backed up. You have two options in this case:
- Add the object to the existing job and wait for the next job run; or
- Create a new job for this workload and have two jobs instead of one.
In the first case, you may end up with retention gaps, which is particularly dangerous for more critical workloads. In the second case, you end up with a cluttered workflow that complicates data protection administration.
With v10.8, you can merge jobs of the same type into a single job to streamline backup management and spend less time on routine tasks. Keep your data protection workflows uncluttered by aggregate backup, backup copy or replication jobs into a single job.
Persistent agent
When performing file-level recovery to a target virtual machine, you need the OS credentials to that VM. However, organizations may have security policies in place that don’t allow sharing credentials with data protection operators.
To avoid any security issues and streamline administration, you can deploy a persistent agent on virtual machines for guest processing and access your VMs without the need to enter VM credentials. With an agent, the solution communicates with target VMs over a single port without compromising the organization’s security policies.
Try All Features Option
In version 10.8, the full functionality of NAKIVO is just a click away! Regardless of your current version of the solution, you can try the Enterprise Plus version for 15 days in your environment at no additional cost. At the end of the 15-day trial period, you will automatically be reverted to a paid license and version of the solution.
iIT Distribution is the official distributor of NAKIVO in Ukraine, Kazakhstan, Georgia, and Uzbekistan. We offer a variety of cybersecurity solutions to help companies comprehensively protect and improve the efficiency of their IT infrastructures. We work closely with our customers and partners to provide full support in the design and implementation of custom solutions.
Back