{"id":8240,"date":"2023-04-24T15:18:52","date_gmt":"2023-04-24T15:18:52","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=8240"},"modified":"2023-04-24T15:18:52","modified_gmt":"2023-04-24T15:18:52","slug":"opentexts-carbonite-suite-of-data-protection-products","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/","title":{"rendered":"OpenText&#8217;s Carbonite Suite of Data Protection Products"},"content":{"rendered":"<p>It&#8217;s a jungle out there. The number of attack vectors on your data continues to multiply exponentially. Every two seconds a ransomeware attack occurs, 91% of breaches are due to human error.  <\/p>\n<p>Growing number of remote users, networks, devices, endpoints and data create the perfect conditions for cybercrime.  <\/p>\n<p>OpenText&#8217;s Carbonite Suite of Data Protection Products can help make sure you maintain access to the systems and information you need to run your business; plus, ensure your data is where you need it and when you need it to minimize the disruption of an attack, or even prevent it in the first place. View the infographic for an at-a-glance.<\/p>\n<p><a href=\"https:\/\/stuf.in\/bb7y4v\" target=\"_blank\" rel=\"noopener\">View: OpenText&#8217;s Carbonite Suite of Data Protection Products<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s a jungle out there. The number of attack vectors on data continues to multiply exponentially. Every two seconds a ransomware attack occurs.  <\/p>\n<p>But you don&#8217;t have to take this @#$% anymore. <\/p>\n<p>View this infographic to see how @OpenText Suite of Data Protection Products with @Carbonite helps you maintain access to the systems and information you need to run your business. DM us to learn more.<\/p>\n","protected":false},"author":2,"featured_media":8239,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1136],"tags":[],"class_list":["post-8240","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OpenText&#039;s Carbonite Suite of Data Protection Products - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OpenText&#039;s Carbonite Suite of Data Protection Products - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"It&#039;s a jungle out there. The number of attack vectors on data continues to multiply exponentially. Every two seconds a ransomware attack occurs.  But you don&#039;t have to take this @#$% anymore.  View this infographic to see how @OpenText Suite of Data Protection Products with @Carbonite helps you maintain access to the systems and information you need to run your business. DM us to learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-24T15:18:52+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"OpenText&#8217;s Carbonite Suite of Data Protection Products\",\"datePublished\":\"2023-04-24T15:18:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/\"},\"wordCount\":126,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/in_Carbonite_Business_Runs_on_Data_ARM_thumb.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/\",\"name\":\"OpenText's Carbonite Suite of Data Protection Products - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/in_Carbonite_Business_Runs_on_Data_ARM_thumb.jpg\",\"datePublished\":\"2023-04-24T15:18:52+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/in_Carbonite_Business_Runs_on_Data_ARM_thumb.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/in_Carbonite_Business_Runs_on_Data_ARM_thumb.jpg\",\"width\":600,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OpenText&#8217;s Carbonite Suite of Data Protection Products\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OpenText's Carbonite Suite of Data Protection Products - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/","og_locale":"en_US","og_type":"article","og_title":"OpenText's Carbonite Suite of Data Protection Products - TechTonic Times","og_description":"It's a jungle out there. The number of attack vectors on data continues to multiply exponentially. Every two seconds a ransomware attack occurs.  But you don't have to take this @#$% anymore.  View this infographic to see how @OpenText Suite of Data Protection Products with @Carbonite helps you maintain access to the systems and information you need to run your business. DM us to learn more.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/","og_site_name":"TechTonic Times","article_published_time":"2023-04-24T15:18:52+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"OpenText&#8217;s Carbonite Suite of Data Protection Products","datePublished":"2023-04-24T15:18:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/"},"wordCount":126,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/in_Carbonite_Business_Runs_on_Data_ARM_thumb.jpg","articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/","name":"OpenText's Carbonite Suite of Data Protection Products - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/in_Carbonite_Business_Runs_on_Data_ARM_thumb.jpg","datePublished":"2023-04-24T15:18:52+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/in_Carbonite_Business_Runs_on_Data_ARM_thumb.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/in_Carbonite_Business_Runs_on_Data_ARM_thumb.jpg","width":600,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/opentexts-carbonite-suite-of-data-protection-products\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"OpenText&#8217;s Carbonite Suite of Data Protection Products"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/8240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=8240"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/8240\/revisions"}],"predecessor-version":[{"id":8241,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/8240\/revisions\/8241"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/8239"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=8240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=8240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=8240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}