{"id":9107,"date":"2023-08-10T13:03:38","date_gmt":"2023-08-10T13:03:38","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=9107"},"modified":"2023-08-10T13:03:38","modified_gmt":"2023-08-10T13:03:38","slug":"introducing-the-zerto-cyber-resilience-vault","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/","title":{"rendered":"Introducing the Zerto Cyber Resilience Vault"},"content":{"rendered":"<p><iframe width=\"560\" height=\"315\" src=\"\/\/www.youtube.com\/embed\/f27pBo-um-g\" frameborder=\"0\" allowfullscreen><\/iframe><br \/>\n    With the HPE Zerto cyber resilience vault, you can reduce data loss and downtime in the event of ransomware attacks. Watch this video to see how it works.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introducing the #HPE Zerto cyber resilience vault! It&#8217;s your own isolated, zero-trust digital clean room designed to reduce data loss and downtime in the event of ransomware attacks. \ud83d\udd10 To learn how it works, watch this video. If you&#8217;d like to further explore this solution, Abrahams Consulting LLC can answer your questions.<\/p>\n","protected":false},"author":2,"featured_media":9106,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1141,1136],"tags":[],"class_list":["post-9107","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hpe","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Introducing the Zerto Cyber Resilience Vault - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing the Zerto Cyber Resilience Vault - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Introducing the #HPE Zerto cyber resilience vault! It&#039;s your own isolated, zero-trust digital clean room designed to reduce data loss and downtime in the event of ransomware attacks. \ud83d\udd10 To learn how it works, watch this video. If you&#039;d like to further explore this solution, Abrahams Consulting LLC can answer your questions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-10T13:03:38+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Introducing the Zerto Cyber Resilience Vault\",\"datePublished\":\"2023-08-10T13:03:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/\"},\"wordCount\":34,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/08\/maxresdefault-4.jpg\",\"articleSection\":[\"HPE\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/\",\"name\":\"Introducing the Zerto Cyber Resilience Vault - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/08\/maxresdefault-4.jpg\",\"datePublished\":\"2023-08-10T13:03:38+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/08\/maxresdefault-4.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/08\/maxresdefault-4.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introducing the Zerto Cyber Resilience Vault\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introducing the Zerto Cyber Resilience Vault - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/","og_locale":"en_US","og_type":"article","og_title":"Introducing the Zerto Cyber Resilience Vault - TechTonic Times","og_description":"Introducing the #HPE Zerto cyber resilience vault! It's your own isolated, zero-trust digital clean room designed to reduce data loss and downtime in the event of ransomware attacks. \ud83d\udd10 To learn how it works, watch this video. If you'd like to further explore this solution, Abrahams Consulting LLC can answer your questions.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/","og_site_name":"TechTonic Times","article_published_time":"2023-08-10T13:03:38+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Introducing the Zerto Cyber Resilience Vault","datePublished":"2023-08-10T13:03:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/"},"wordCount":34,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/08\/maxresdefault-4.jpg","articleSection":["HPE","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/","name":"Introducing the Zerto Cyber Resilience Vault - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/08\/maxresdefault-4.jpg","datePublished":"2023-08-10T13:03:38+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/08\/maxresdefault-4.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/08\/maxresdefault-4.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/introducing-the-zerto-cyber-resilience-vault\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Introducing the Zerto Cyber Resilience Vault"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/9107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=9107"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/9107\/revisions"}],"predecessor-version":[{"id":9108,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/9107\/revisions\/9108"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/9106"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=9107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=9107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=9107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}