{"id":8458,"date":"2023-05-17T22:09:47","date_gmt":"2023-05-17T22:09:47","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=8458"},"modified":"2023-05-17T22:09:47","modified_gmt":"2023-05-17T22:09:47","slug":"tencate-recovers-from-ransomware-with-zerto-before-and-after","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/","title":{"rendered":"TenCate Recovers from Ransomware with Zerto: Before and After"},"content":{"rendered":"<p>With HPE Zerto, textile manufacturer TenCate was able to recover from a ransomware attack in under 10 minutes. Read this customer story to learn how Zerto makes rapid recovery possible.<\/p>\n<p><a href=\"https:\/\/stuf.in\/bbe7k6\" target=\"_blank\" rel=\"noopener\">View: TenCate Recovers from Ransomware with Zerto: Before and After<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TenCate recovers from ransomware with #HPE Zerto! \u2728 Read this customer story to find out how HPE Zerto helped this manufacturer recover in under 10 minutes. \ud83d\ude4c Want to learn more? Reach out to Abrahams Consulting LLC for details or to explore this solution for your organization.<\/p>\n","protected":false},"author":2,"featured_media":8457,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1141,1136],"tags":[],"class_list":["post-8458","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hpe","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TenCate Recovers from Ransomware with Zerto: Before and After - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TenCate Recovers from Ransomware with Zerto: Before and After - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"TenCate recovers from ransomware with #HPE Zerto! \u2728 Read this customer story to find out how HPE Zerto helped this manufacturer recover in under 10 minutes. \ud83d\ude4c Want to learn more? Reach out to Abrahams Consulting LLC for details or to explore this solution for your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-17T22:09:47+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"TenCate Recovers from Ransomware with Zerto: Before and After\",\"datePublished\":\"2023-05-17T22:09:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/\"},\"wordCount\":48,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/05\/Tencate_Ransomware_Before_and_After_1_thumb.jpg\",\"articleSection\":[\"HPE\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/\",\"name\":\"TenCate Recovers from Ransomware with Zerto: Before and After - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/05\/Tencate_Ransomware_Before_and_After_1_thumb.jpg\",\"datePublished\":\"2023-05-17T22:09:47+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/05\/Tencate_Ransomware_Before_and_After_1_thumb.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/05\/Tencate_Ransomware_Before_and_After_1_thumb.jpg\",\"width\":600,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TenCate Recovers from Ransomware with Zerto: Before and After\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TenCate Recovers from Ransomware with Zerto: Before and After - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/","og_locale":"en_US","og_type":"article","og_title":"TenCate Recovers from Ransomware with Zerto: Before and After - TechTonic Times","og_description":"TenCate recovers from ransomware with #HPE Zerto! \u2728 Read this customer story to find out how HPE Zerto helped this manufacturer recover in under 10 minutes. \ud83d\ude4c Want to learn more? Reach out to Abrahams Consulting LLC for details or to explore this solution for your organization.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/","og_site_name":"TechTonic Times","article_published_time":"2023-05-17T22:09:47+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"TenCate Recovers from Ransomware with Zerto: Before and After","datePublished":"2023-05-17T22:09:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/"},"wordCount":48,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/05\/Tencate_Ransomware_Before_and_After_1_thumb.jpg","articleSection":["HPE","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/","name":"TenCate Recovers from Ransomware with Zerto: Before and After - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/05\/Tencate_Ransomware_Before_and_After_1_thumb.jpg","datePublished":"2023-05-17T22:09:47+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/05\/Tencate_Ransomware_Before_and_After_1_thumb.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/05\/Tencate_Ransomware_Before_and_After_1_thumb.jpg","width":600,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/tencate-recovers-from-ransomware-with-zerto-before-and-after\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"TenCate Recovers from Ransomware with Zerto: Before and After"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/8458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=8458"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/8458\/revisions"}],"predecessor-version":[{"id":8459,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/8458\/revisions\/8459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/8457"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=8458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=8458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=8458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}