November 11, 2020
Industry-Focus Session
Powered by:
Systems, data and backup sets are subject to cyber-attacks. Not only the primary systems and data are in the center of tan attack, but also the back-up catalog, which may be encrypted or corrupted.
Bogdan Stefanescu
Product Sales Manager Data Protection Solutions
Dell Technologies