Chat with us, powered by LiveChat

Disaster Recovery

Demystifying Ransomware: Securing Endpoint Devices

Anthony Jackman
Read Time 5 min.

This post is part of our Demystifying Ransomware series. Read the rest. The headlines just keep piling up! In the past few weeks, we’ve seen ransomware attacks continue to wreak havoc on supply chains and disrupt services. The latest round of casualties includes JBS, the world’s largest processor of fresh beef and pork,...

Demystifying Ransomware: Anatomy of an Attack

Anthony Jackman
Read Time 7 min.

This post is part of our Demystifying Ransomware series. Read the rest. Ransomware attacks have become so common that it’s no longer a matter of how many cyberattacks happen per day — that metric is now measured in seconds. A new company will be hit by a ransomware attack Read Article


Doug Theis
Read Time 4 min.

One of my favorite CIOs once told me there are two kinds of work in corporate IT: AC work and CF work. He then explained the differences. AC work are the business projects that have a material impact on increasing revenue, reducing costs, reducing time to market, and opening new lines of business. These projects typically enhance an organization’s ability...

With DRaaS, Continuous Availability Equals Competitive Advantage

AJ Kuftic
Read Time 2 min.

When IT disaster strikes every moment counts. Because of this, disaster recovery as a service (DRaaS) solutions that automate total network failover and orchestrate application recovery will create a competitive advantage for your business. Push Button DR powered by Zerto is one such solution. As Expedient has offered DRaaS solutions to its clients since 2011, we were well aware...

Push Button DR: Resiliency Options for your Diverse Application Portfolio

AJ Kuftic
Read Time 3 min.

We recently expanded our portfolio of disaster recovery as a service (DRaaS) solutions to provide clients and prospects with more flexibility and choice when it comes to replication options for computing workloads. This diversified DRaaS approach is based on the reality that most organizations utilize myriad workloads that each require different levels of protection. Our multi-tiered approach also...