original-network.com
Open in
urlscan Pro
217.160.0.68
Public Scan
Submitted URL: http://original-network.com/
Effective URL: https://original-network.com/
Submission: On June 21 via api from GB — Scanned from GB
Effective URL: https://original-network.com/
Submission: On June 21 via api from GB — Scanned from GB
Form analysis
4 forms found in the DOMGET https://original-network.com
<form class="searchform" method="get" action="https://original-network.com">
<div class="input-group">
<div class="form-group live-search-input">
<label for="s" class="screen-reader-text">Search for:</label>
<input type="text" id="s" name="s" class="form-control" placeholder="Search">
</div>
<span class="input-group-btn">
<button class="btn btn-default" type="submit"><i class="fa fa-search"></i></button>
</span>
</div>
</form>
POST #
<form action="#" method="post" accept-charset="utf-8" id="subscribe-blog-blog_subscription-3">
<div id="subscribe-text">
<p>Enter your email address to subscribe to this blog and receive notifications of new posts by email.</p>
</div>
<div class="jetpack-subscribe-count">
<p> Join 981 other subscribers </p>
</div>
<p id="subscribe-email">
<label id="jetpack-subscribe-label" class="screen-reader-text" for="subscribe-field-blog_subscription-3"> Email Address </label>
<input type="email" name="email" required="required" value="" id="subscribe-field-blog_subscription-3" placeholder="Email Address">
</p>
<p id="subscribe-submit">
<input type="hidden" name="action" value="subscribe">
<input type="hidden" name="source" value="https://original-network.com/">
<input type="hidden" name="sub-type" value="widget">
<input type="hidden" name="redirect_fragment" value="subscribe-blog-blog_subscription-3">
<button type="submit" class="wp-block-button__link" name="jetpack_subscriptions_widget"> Subscribe </button>
</p>
</form>
POST
<form method="post">
<input type="submit" value="Close and accept" class="accept">
</form>
POST /
<form action="/" method="post">
<label for="target_email">Send to Email Address</label>
<input type="email" name="target_email" id="target_email" value="">
<label for="source_name">Your Name</label>
<input type="text" name="source_name" id="source_name" value="">
<label for="source_email">Your Email Address</label>
<input type="email" name="source_email" id="source_email" value="">
<input type="text" id="jetpack-source_f_name" name="source_f_name" class="input" value="" size="25" autocomplete="off" title="This field is for validation and should not be changed">
<img style="float: right; display: none" class="loading" src="https://original-network.com/wp-content/plugins/jetpack/modules/sharedaddy/images/loading.gif" alt="loading" width="16" height="16">
<input type="submit" value="Send Email" class="sharing_send">
<a rel="nofollow" href="#cancel" class="sharing_cancel" role="button">Cancel</a>
<div class="errors errors-1" style="display: none;"> Post was not sent - check your email addresses! </div>
<div class="errors errors-2" style="display: none;"> Email check failed, please try again </div>
<div class="errors errors-3" style="display: none;"> Sorry, your blog cannot share posts by email. </div>
</form>
Text Content
Toggle navigation Original-Network.com * Home * Publications * Webinars * Partners * Veeam Software * Advertise * About * Contact * Legal Information * Website Terms and Conditions * Privacy Policy * Cookie Policy May 17 PROTECT YOUR DATA WITH VEEAM AND WASABI * By Christopher GLEMOT in Backup, Cloud, Data Protection, Object Storage, Ransomware, Veeam, Wasabi Many organizations still view cloud storage as less secure than air-gapped, offline storage. These organizations feel that if data is connected to a network, it can be accidentally deleted or susceptible to ransomware. The traditional method of air gapping data for protection meant that an organization’s data was stored offline in an LTO tape cartridge or HDD that was disconnected from power sources. Retrieving data stored in this fashion could take many hours to days and is vulnerable to bit rot or damage that could ultimately destroy the data. Object Lock removes the perceived vulnerability of errant deletion or ransomware while keeping the integrity of the data, and having the data readily available and instantly accessible. Here’s a blog post about the Object Lock feature offered by Wasabi with Veeam Backup & Replication. Continue reading SHARE THIS: * Share * * * * * Email * Print * * Share * * Backup, Immutable, Object Lock, Object Sotrage, Ransomware, S3, Veeam, Wasabi * Leave comment May 16 WASABI – OBJECT LOCK FEATURE SPOTLIGHT * By Christopher GLEMOT in Backup, Cloud, Data Protection, Object Storage, Storage, Wasabi Hi, I’m in Vegas this week for VeeamON 2022, just had a sneak peek of some of the content, and some very cool demos to look out for (a special session by Rick Vanover). Moving to S3-compatible object storage next. An interesting trend is the adoption of S3-compatible object storage by enterprises. If in 2021, data showed that object storage was almost exclusively used by enterprise customers, these days there is also a long tail of smaller deployments on vendors like Wasabi (Cloud Hot Storage). It’s a very interesting solution, I encourage you to visit the Wasabi stand if you participate at VeeamON in Vegas (exhibitors area). With it, you can store your data by making data storage simple, affordable, fast, and secure (compliance, sovereignty). Basically, there are many use cases, such as offsite backup, especially with Veeam. Shortly, I will publish some blog posts about Wasabi with Veeam. Here’s a blog post about the Object Lock feature powered by Wasabi. Continue reading SHARE THIS: * Share * * * * * Email * Print * * Share * * Backup, Cloud storage, Immutable, Object Lock, Wasabi * Leave comment May 15 VEEAM AND THE S3-COMPATIBLE OBJECT STORAGE SOLUTIONS * By Christopher GLEMOT in Backup, Cloud, Object Storage, Storage, Veeam, Wasabi Talking about the 4 hyperscalers (Amazon/Azure/Google/IBM), as expected Amazon and Azure are unquestionable leaders leaving just a few percent of the Veeam backup market to IBM and Google. While among the last two, IBM seems to be laser-focused on larger customers as indicated by a few times higher average used space. Continue reading SHARE THIS: * Share * * * * * Email * Print * * Share * * Backup, Cloud, Object Lock, Object storage, S3, Veeam * 1 comment Mar 15 CRITICAL VULNERABILITIES DISCOVERED IN VEEAM PRODUCTS * By Philippe DUPUIS in Backup, Cryptolocker, Data Protection, Veeam, Veeam Agent for Windows, Veeam B&R 10, Veeam B&R 11, Veeam B&R 9.5, Vulnerability Management Veeam annouced patches for critical vulnerabilities impacting their products this weekend. The flaws has been uncovevered by Positive Technologies, a cybersecurity company based in South Korea. Let’s take a closer look to this vulnerabilities found. Continue reading SHARE THIS: * Share * * * * * Email * Print * * Share * * CVE, CVSS, Veeam, Vulnerability * Leave comment Mar 01 VEEAM AGENT ERROR “FAILED TO PROCESS : BIOS UUID HAS BEEN MODIFIED, PLEACE RESCAN THE HOST “ * By Philippe DUPUIS in Backup, Veeam, Veeam Agent for Windows, Veeam B&R 11, Veeam Endpoint Backup, Windows 10 Today I want to share with you the resolution of a Veeam Error I had to deal with and why it’s important to apply updates and check the compatibility matrix. Continue reading SHARE THIS: * Share * * * * * Email * Print * * Share * * Backup, Veeam, Veeam Agent for Windows, Veeam v11 * Leave comment * * 1 * 2 * 3 * … * 42 * Search for: FOLLOW ME Christopher Glémot is a Data Management & Security Team Leader. Owner of Original-Network.com – Waves of Data. This blog is mainly focused on Data Management, Security, Backup, Disaster Recovery, Virtualization, Storage, Cloud and Vulnerability Management, but also covers Active Directory. You can find detailed how-to procedures, tutorials and product reviews. SPONSORS SUBSCRIBE TO BLOG VIA EMAIL Enter your email address to subscribe to this blog and receive notifications of new posts by email. Join 981 other subscribers Email Address Subscribe © 2022 Original-Network.com . Advertise | RSS Feed | All rights reserved. Published by ArmoricanCloud.com. Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. To find out more, including how to control cookies, see here: Cookie Policy Send to Email Address Your Name Your Email Address Cancel Post was not sent - check your email addresses! Email check failed, please try again Sorry, your blog cannot share posts by email.