InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How University of Reading's SaaS Data Management Strategy Protects Critical Data

Presented by

Kevin Mortimer, Head of Operations, University of Reading | Salvatore Buccoliero, Technical GTM SaaS & Security

About this talk

Microsoft 365 has become a “gold mine” for threat actors and a prime target for ransomware attacks. Without adequate protection, the immeasurable volumes of data in your Microsoft 365 environment are at risk. In this session, you’ll hear how University of Reading leverages Rubrik’s data protection suite to ensure critical Exchange, Sharepoint, OneDrive, and Teams data is protected, compliant, and securely managed for long-term retention and rapid recovery. Watch this and learn about: -> How at risk your Microsoft 365 data is and why cyber criminals love to leverage that -> Learn how University of Reading is applying third-party backup as part of their robust SaaS data management strategy -> See how you can onboard, automate protection, and rapidly recover your application data – all from one interface – with Rubrik Make sure to take a look at the attachments as well - we've added extra learnings on how to optimise data protection and provided you with additional resources to help set you up for success.
Rubrik

Rubrik

21697 subscribers142 talks
Zero Trust Data Management Webcasts For IT Professionals
What is Zero Trust Data Management? An estimated 2 out of 3 ransomware attacks now target backups. That’s why it’s vital to ensure your backups are 100% protected and resilient. With zero trust data management no one is trustworthy. No user. No application. No device. To meet this new standard, data must be natively immutable so that it can never be modified, encrypted, or deleted by ransomware. Data needs to be ready at all times so you can recover what you need, and never pay a ransom.
Related topics