<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>TechTonic Times</provider_name><provider_url>https://www.abrahamsconsulting.com/blog</provider_url><title>Understanding Zerto HPE Data Protection - TechTonic Times</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="0v6Q4Ujn95"&gt;&lt;a href="https://www.abrahamsconsulting.com/blog/understanding-zerto-hpe-data-protection/"&gt;Understanding Zerto HPE Data Protection&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.abrahamsconsulting.com/blog/understanding-zerto-hpe-data-protection/embed/#?secret=0v6Q4Ujn95" width="600" height="338" title="&#x201C;Understanding Zerto HPE Data Protection&#x201D; &#x2014; TechTonic Times" data-secret="0v6Q4Ujn95" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.abrahamsconsulting.com/blog/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.abrahamsconsulting.com/blog/wp-content/uploads/2024/01/hqdefault.jpg</thumbnail_url><thumbnail_width>480</thumbnail_width><thumbnail_height>360</thumbnail_height><description>Here's how Zerto @HPE data protection works! &#x1F4A1; Watch this short video to see how Zerto delivers rapid recovery in the event of ransomware, human error, or hardware failures. To learn more, or to get started with Zerto, reach out to Abrahams Consulting LLC today.</description></oembed>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/


Served from: www.abrahamsconsulting.com @ 2026-05-09 14:17:38 by W3 Total Cache
-->