{"id":729,"date":"2018-08-08T10:11:21","date_gmt":"2018-08-08T10:11:21","guid":{"rendered":"https:\/\/panel.p2pmk.xyz\/~kabtel\/?page_id=729"},"modified":"2022-03-04T09:08:17","modified_gmt":"2022-03-04T08:08:17","slug":"nakivo-data-protection-site-recovery-kabtel","status":"publish","type":"page","link":"https:\/\/kabtel.mk\/en\/solutions\/nakivo-data-protection-site-recovery-kabtel\/","title":{"rendered":"Data Protection"},"content":{"rendered":"<p>[vc_section css=&#8221;.vc_custom_1599862059720{background-image: url(https:\/\/panel.p2pmk.xyz\/~kabtel\/wp-content\/uploads\/2020\/09\/data-protection.png?id=3815) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;mask text-shadow&#8221;][vc_row css=&#8221;.vc_custom_1599859708020{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;20px&#8221;][vc_custom_heading text=&#8221;Data Protection&#8221; font_container=&#8221;tag:h2|font_size:6rem|text_align:center|color:%23ffffff|line_height:0.9&#8243; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;custom-hd delay-2&#8243;][vc_separator color=&#8221;white&#8221; border_width=&#8221;5&#8243; el_width=&#8221;10&#8243; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;delay-4&#8243; css=&#8221;.vc_custom_1540434095954{margin-bottom: 50px !important;padding-top: 15px !important;}&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1619074456906{margin-left: 3px !important;}&#8221; el_class=&#8221;delay-3&#8243;]<\/p>\n<p style=\"text-align: center;\"><a class=\"button line\" href=\"https:\/\/kabtel.mk\/en\/contact-us\/\">Get a solution quote<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][\/vc_section][vc_row][vc_column offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_widget_sidebar sidebar_id=&#8221;sidebar-5f57b4899cbe0&#8243;][\/vc_column][\/vc_row][vc_section css_animation=&#8221;none&#8221; el_id=&#8221;overview&#8221;][vc_row el_class=&#8221;gradient2&#8243;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;100px&#8221;][vc_custom_heading text=&#8221;overview&#8221; font_container=&#8221;tag:h6|font_size:10px|text_align:center|color:%23627792&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;style1&#8243;][vc_empty_space height=&#8221;6px&#8221;][vc_custom_heading text=&#8221;Your data today is more valuable than ever, protect it&#8221; font_container=&#8221;tag:h3|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">Today, the volume of enterprise data is exploding across industries! We talk about petabytes, and even exabytes, of data strewn across data centers, file shares, databases, and cloud storage and backups. Yet, a few organizations have the visibility of their sensitive data they need to protect.<br \/>\nMost businesses simply do not know what sensitive data they have, where it is, how it flows, who can access it, and its risk of exposure. In organizations that are complex or have siloes of data, the lack of a clear view of sensitive data can make it very difficult to apply effective policies and controls to protect this most critical asset.<br \/>\nThird-party risk is also a big concern. Vendors, partners, service providers, and others you share data with all add to your organization&#8217;s risk not only for a data breach or a failed audit, but also collateral damage to your customers&#8217; trust, your brand value, and your partner ecosystem.<br \/>\nRecently, a number of high-profile data breaches have put data privacy in the spotlight. From lost business and reputational damage to devastating financial and legal consequences, the impact of a data breach can haunt companies for years.<br \/>\nHowever, that is just a part of the story. Stringent data privacy laws continue to pop up around the world. This ever-evolving regulatory landscape leaves companies to interpret and comply with a growing patchwork of state, global, and industry-specific data privacy and<br \/>\nsecurity laws, creating significant risks for compliance. Clearly, companies need a simpler way to comply.<\/p>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; el_id=&#8221;backup&#8221;][vc_row gap=&#8221;35&#8243; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1599859384700{padding-top: 50px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}&#8221;][vc_column width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;3674&#8243; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInLeft&#8221;][vc_empty_space height=&#8221;20px&#8221; css=&#8221;.vc_custom_1600868677043{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][\/vc_column][vc_column css_animation=&#8221;fadeIn&#8221; width=&#8221;1\/2&#8243; el_class=&#8221;delay-1&#8243; css=&#8221;.vc_custom_1600868687442{margin-right: -90px !important;}&#8221; offset=&#8221;vc_col-xs-9&#8243;][vc_custom_heading text=&#8221;Backup and Replication&#8221; font_container=&#8221;tag:h6|font_size:15px|text_align:center|color:%23627792&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;style1&#8243;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]NAKIVO Backup &amp; Replication is a fast, reliable, and affordable data protection and site recovery solution for both SMBs and large enterprises. Built with automation and reliability in mind, NAKIVO Backup &amp; Replication offers enterprise-grade level functionality, while being lightweight and easy to use. The solution offers a complete suite of backup, replication, and recovery features for physical, virtual, and cloud environments. By providing you with great flexibility and multiple automation options, NAKIVO Backup &amp; Replication saves you time and resources, allowing you to direct your attention elsewhere. Our solution can help you protect critical data and applications in a secure and reliable manner, then recover what you need in just a few clicks. As a result, for example when ransomware strikes, you can perform successful ransomware recovery eliminating the need to pay out the ransom and reduce the impact of a malicious attack.<br \/>\nTop reasons to choose Nakivo:<\/p>\n<ul>\n<li>Simplicity and Ease of Use<\/li>\n<li>Flexibility of Deployment<\/li>\n<li>High Reliability and Security of Backups<\/li>\n<li>Flexible Scheduling of Backup jobs<\/li>\n<li>Automated (policy-based) Data Protection<\/li>\n<li>Remote Site Data Backup<\/li>\n<li>Instant Recovery of Data<\/li>\n<li>Automated Disaster Recovery<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;20px&#8221; css=&#8221;.vc_custom_1600868719514{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;Provided by our partners:&#8221; font_container=&#8221;tag:h6|font_size:15px|text_align:center|color:%23627792&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;style2&#8243;][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;2779&#8243; img_size=&#8221;1170&#215;700&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow&#8221; onclick=&#8221;custom_link&#8221; css_animation=&#8221;fadeInRight&#8221; link=&#8221;https:\/\/kabtel.mk\/partners\/nakivo&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; el_id=&#8221;dlp&#8221;][vc_row gap=&#8221;35&#8243; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1599859407254{padding-top: 50px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}&#8221;][vc_column width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;3677&#8243; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInLeft&#8221;][vc_empty_space height=&#8221;20px&#8221; css=&#8221;.vc_custom_1600868747664{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][\/vc_column][vc_column css_animation=&#8221;fadeIn&#8221; width=&#8221;1\/2&#8243; el_class=&#8221;delay-1&#8243; css=&#8221;.vc_custom_1600868780073{margin-right: -90px !important;}&#8221; offset=&#8221;vc_col-xs-9&#8243;][vc_custom_heading text=&#8221;Data Loss Prevention&#8221; font_container=&#8221;tag:h6|font_size:15px|text_align:center|color:%23627792&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;style1&#8243;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">Data protection has always been an object of serious attention by enterprise security executives and compliance officers, but the recent privacy laws will undoubtedly elevate data protection to the boardroom due to the potentially serious consequences of noncompliance. What makes it even more challenging is that companies of all sizes are adopting cloud-based services, such as Microsoft Office 365, to give their employees greater flexibility and easier access to core business applications. As regulations and corporate needs place increasing demands on IT to ensure safe data handling, deploying necessary protective solutions can seem<br \/>\ndaunting. Some data loss prevention (DLP) products require substantial effort to deploy and typically have large ongoing consulting costs. Some DLP products leave it up to IT to know about all the data that needs to be protected, adding administrative burden and causing false positives. Others rely on the IT administrator to manage disparate consoles across multiple environments\u2014endpoints, network, and the cloud.<br \/>\nBuilt from the ground up, our DLP solution quickly and effectively protects your data wherever it may be. We make it easy to get the solution up and running by delivering it as simple components that can start analyzing your data in minutes, not months. Extending your on-premises DLP policies to the cloud has never been easier.<br \/>\nKey Advantages:<\/p>\n<ul>\n<li style=\"text-align: justify;\">Device-to-cloud DLP \u2013 Connect and synchronize on-premises DLP and cloud DLP policies in less than one minute<\/li>\n<li style=\"text-align: justify;\">Unique capture technology \u2013 Aid with forensic analysis of data loss events that occurred prior to creation of rules; Visibility on how your data is being used to help fine-tune rules and policies<\/li>\n<li style=\"text-align: justify;\">Flexible end-user classification \u2013 Alleviates administrative burden and increases end-user data protection awareness; Native manual classification and third party classification integration options<\/li>\n<li style=\"text-align: justify;\">A single-pane-of-glass management experience \u2013 Centralized console for all policy and incident management<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;20px&#8221; css=&#8221;.vc_custom_1600868793050{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;Provided by our partners:&#8221; font_container=&#8221;tag:h6|font_size:15px|text_align:center|color:%23627792&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;style2&#8243;][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;3756&#8243; img_size=&#8221;167&#215;50&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow&#8221; onclick=&#8221;custom_link&#8221; css_animation=&#8221;fadeInRight&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; el_id=&#8221;networkencryption&#8221;][vc_row gap=&#8221;35&#8243; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1599859445411{padding-top: 50px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}&#8221;][vc_column width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;3680&#8243; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInLeft&#8221;][vc_empty_space height=&#8221;20px&#8221; css=&#8221;.vc_custom_1600868821706{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][\/vc_column][vc_column css_animation=&#8221;fadeIn&#8221; width=&#8221;1\/2&#8243; el_class=&#8221;delay-1&#8243; css=&#8221;.vc_custom_1600868847989{margin-right: -90px !important;}&#8221; offset=&#8221;vc_col-xs-9&#8243;][vc_custom_heading text=&#8221;Network Encryption&#8221; font_container=&#8221;tag:h6|font_size:15px|text_align:center|color:%23627792&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;style1&#8243;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">Networks are under constant attack and sensitive assets continue to be exposed. More than ever, leveraging encryption is a vital mandate for addressing threats to data as it crosses networks. Thales High Speed Encryption solutions provide customers with a single platform to \u2018encrypt everywhere\u2019\u2014 from network traffic between data centers and the headquarters to backup and disaster recovery sites, whether on premises or in the cloud. Thales\u2019s comprehensive network traffic encryption solutions use Layer 2 and 3 encryption to ensure security without compromise. Ensuring maximum throughput with minimal latency, Thales Network Encryptors allow customers to better protect data, video, voice, and metadata from eavesdropping, surveillance, and overt and covert interception\u2014all at an affordable cost and without performance compromise.<br \/>\nThales High Speed Encryption advantages:<\/p>\n<ul>\n<li style=\"text-align: justify;\"><strong>Robust Security for Sensitive Traffic<\/strong> \u2013 Thales Network Encryptors, hardware-based, stand-alone appliances deliver robust encryption and FIPS 140-2 Level 3 tamper-resistant key management capabilities.<\/li>\n<li style=\"text-align: justify;\"><strong>Maximum Performance and High Availability<\/strong> \u2013 Thales High Speed Encryption solutions have been proven to deliver max uptime in the most demanding, performance intensive environments.<\/li>\n<li style=\"text-align: justify;\"><strong>Optimal Flexibility<\/strong> \u2013 Thales High Speed Encryption solutions offer flexible, vendor agnostic interoperability, meaning they\u2019re compatible with all the leading network vendors throughout your network.<\/li>\n<li style=\"text-align: justify;\"><strong>Crypto-Agility<\/strong>\u00a0\u2013 Thales Network Encryptors are crypto-agile, meaning they support customizable encryption for a wide range of elliptic and custom curves support.<\/li>\n<li style=\"text-align: justify;\"><strong>Transport Independent Mode<\/strong> \u2013 Thales Network Encryptors are the first to offer Transport Independent Mode (TIM) &#8211; network layer independent (Layers 2, 3, &amp; 4) and protocol agnostic data in motion encryption.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;20px&#8221; css=&#8221;.vc_custom_1600868861651{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;Provided by our partners:&#8221; font_container=&#8221;tag:h6|font_size:15px|text_align:center|color:%23627792&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;style2&#8243;][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;2783&#8243; img_size=&#8221;1170&#215;700&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow&#8221; onclick=&#8221;custom_link&#8221; css_animation=&#8221;fadeInRight&#8221; link=&#8221;https:\/\/kabtel.mk\/partners\/thales&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; el_id=&#8221;dataencryption&#8221;][vc_row gap=&#8221;35&#8243; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1599859456004{padding-top: 50px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}&#8221;][vc_column width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;3681&#8243; alignment=&#8221;center&#8221; css_animation=&#8221;fadeInLeft&#8221;][vc_empty_space height=&#8221;20px&#8221; css=&#8221;.vc_custom_1600868890269{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][\/vc_column][vc_column css_animation=&#8221;fadeIn&#8221; width=&#8221;1\/2&#8243; el_class=&#8221;delay-1&#8243; css=&#8221;.vc_custom_1600868911990{margin-right: -90px !important;}&#8221; offset=&#8221;vc_col-xs-9&#8243;][vc_custom_heading text=&#8221;Data-at-Rest Encryption&#8221; font_container=&#8221;tag:h6|font_size:15px|text_align:center|color:%23627792&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;style1&#8243;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">Safeguarding sensitive data requires much more than just securing a data center\u2019s on-premises databases and files. Enterprises today use a mix of complex on-premise and cloud environments that leverage different technologies and security standards, and can potentially leave critical data exposed. To further complicate the problem, cyber-attacks have grown in sophistication and power. New compliance and regulatory mandates around protection of sensitive information keep on coming, and existing regulations have become more stringent.<br \/>\nCipherTrust Transparent Encryption delivers data-at-rest encryption with centralized key management, privileged user access control, and detailed data access audit logging that helps organizations meet compliance and best practice requirements for protecting data, wherever it resides. The FIPS 140-2 compliant CipherTrust Transparent Encryption agent resides at the operating file-system or device layer, and encryption and decryption is transparent to all applications that run above it. CipherTrust Transparent Encyption provides rich access controls, which allow organizations to determine who can access data, when they can access it, and what type of access they have.<br \/>\nKey advantages:<\/p>\n<ul>\n<li style=\"text-align: justify;\"><strong>Transparent data protection<\/strong><\/li>\n<li style=\"text-align: justify;\"><strong>Seamless and easy to deploy<\/strong><\/li>\n<li style=\"text-align: justify;\"><strong>Define granular access controls<\/strong><\/li>\n<li style=\"text-align: justify;\"><strong>High-performance hardware accelerated encryption<\/strong><\/li>\n<li style=\"text-align: justify;\"><strong>Comprehensive security intelligence<\/strong><\/li>\n<li style=\"text-align: justify;\"><strong>Broadest system and environment support<\/strong><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;20px&#8221; css=&#8221;.vc_custom_1600868923660{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;Provided by our partners:&#8221; font_container=&#8221;tag:h6|font_size:15px|text_align:center|color:%23627792&#8243; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;style2&#8243;][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;2783&#8243; img_size=&#8221;1170&#215;700&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow&#8221; onclick=&#8221;custom_link&#8221; css_animation=&#8221;fadeInRight&#8221; link=&#8221;https:\/\/kabtel.mk\/partners\/thales&#8221;][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_section css=&#8221;.vc_custom_1599862059720{background-image: url(https:\/\/panel.p2pmk.xyz\/~kabtel\/wp-content\/uploads\/2020\/09\/data-protection.png?id=3815) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;mask text-shadow&#8221;][vc_row css=&#8221;.vc_custom_1599859708020{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;20px&#8221;][vc_custom_heading text=&#8221;Data Protection&#8221; font_container=&#8221;tag:h2|font_size:6rem|text_align:center|color:%23ffffff|line_height:0.9&#8243; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;custom-hd delay-2&#8243;][vc_separator color=&#8221;white&#8221; border_width=&#8221;5&#8243; el_width=&#8221;10&#8243; css_animation=&#8221;fadeInUp&#8221; el_class=&#8221;delay-4&#8243; css=&#8221;.vc_custom_1540434095954{margin-bottom: 50px !important;padding-top: 15px !important;}&#8221;][vc_column_text css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1619074456906{margin-left: 3px !important;}&#8221; el_class=&#8221;delay-3&#8243;] Get a solution quote [\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][\/vc_section][vc_row][vc_column offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_widget_sidebar sidebar_id=&#8221;sidebar-5f57b4899cbe0&#8243;][\/vc_column][\/vc_row][vc_section css_animation=&#8221;none&#8221; el_id=&#8221;overview&#8221;][vc_row el_class=&#8221;gradient2&#8243;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":721,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"tmpl\/template-fullwidth.php","meta":{"footnotes":""},"class_list":["post-729","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>nakivo-data-protection-site-recovery-kabtel<\/title>\n<meta name=\"description\" content=\"NAKIVO is a fast,reliable, and affordable data protection and site recovery solution for both SMBs and large enterprises-KABTEL-www.kabtel.mk\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kabtel.mk\/en\/solutions\/nakivo-data-protection-site-recovery-kabtel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"nakivo-data-protection-site-recovery-kabtel\" \/>\n<meta property=\"og:description\" content=\"NAKIVO is a fast,reliable, and affordable data protection and site recovery solution for both SMBs and large enterprises-KABTEL-www.kabtel.mk\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kabtel.mk\/en\/solutions\/nakivo-data-protection-site-recovery-kabtel\/\" \/>\n<meta property=\"og:site_name\" content=\"KABTEL\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Kabtelgroup\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-04T08:08:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kabtel.mk\/wp-content\/uploads\/2020\/10\/KABTEL-wemakeITwork-web2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1438\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Kabtel\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/solutions\\\/nakivo-data-protection-site-recovery-kabtel\\\/\",\"url\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/solutions\\\/nakivo-data-protection-site-recovery-kabtel\\\/\",\"name\":\"nakivo-data-protection-site-recovery-kabtel\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/#website\"},\"datePublished\":\"2018-08-08T10:11:21+00:00\",\"dateModified\":\"2022-03-04T08:08:17+00:00\",\"description\":\"NAKIVO is a fast,reliable, and affordable data protection and site recovery solution for both SMBs and large enterprises-KABTEL-www.kabtel.mk\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/solutions\\\/nakivo-data-protection-site-recovery-kabtel\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kabtel.mk\\\/en\\\/solutions\\\/nakivo-data-protection-site-recovery-kabtel\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/solutions\\\/nakivo-data-protection-site-recovery-kabtel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Data Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/\",\"name\":\"KABTEL\",\"description\":\"We make IT work\",\"publisher\":{\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/#organization\",\"name\":\"KABTEL dooel\",\"url\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/kabtel.mk\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/cropped-logo-20-goini-KABTEL-kocka.png\",\"contentUrl\":\"https:\\\/\\\/kabtel.mk\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/cropped-logo-20-goini-KABTEL-kocka.png\",\"width\":512,\"height\":512,\"caption\":\"KABTEL dooel\"},\"image\":{\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Kabtelgroup\",\"https:\\\/\\\/x.com\\\/Kabtel\",\"https:\\\/\\\/www.instagram.com\\\/kabtel.mk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/377487\\\/admin\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCleLLF47J_M1VL2m3m0nKxw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"nakivo-data-protection-site-recovery-kabtel","description":"NAKIVO is a fast,reliable, and affordable data protection and site recovery solution for both SMBs and large enterprises-KABTEL-www.kabtel.mk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kabtel.mk\/en\/solutions\/nakivo-data-protection-site-recovery-kabtel\/","og_locale":"en_US","og_type":"article","og_title":"nakivo-data-protection-site-recovery-kabtel","og_description":"NAKIVO is a fast,reliable, and affordable data protection and site recovery solution for both SMBs and large enterprises-KABTEL-www.kabtel.mk","og_url":"https:\/\/kabtel.mk\/en\/solutions\/nakivo-data-protection-site-recovery-kabtel\/","og_site_name":"KABTEL","article_publisher":"https:\/\/www.facebook.com\/Kabtelgroup","article_modified_time":"2022-03-04T08:08:17+00:00","og_image":[{"width":1438,"height":425,"url":"https:\/\/kabtel.mk\/wp-content\/uploads\/2020\/10\/KABTEL-wemakeITwork-web2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@Kabtel","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kabtel.mk\/en\/solutions\/nakivo-data-protection-site-recovery-kabtel\/","url":"https:\/\/kabtel.mk\/en\/solutions\/nakivo-data-protection-site-recovery-kabtel\/","name":"nakivo-data-protection-site-recovery-kabtel","isPartOf":{"@id":"https:\/\/kabtel.mk\/en\/#website"},"datePublished":"2018-08-08T10:11:21+00:00","dateModified":"2022-03-04T08:08:17+00:00","description":"NAKIVO is a fast,reliable, and affordable data protection and site recovery solution for both SMBs and large enterprises-KABTEL-www.kabtel.mk","breadcrumb":{"@id":"https:\/\/kabtel.mk\/en\/solutions\/nakivo-data-protection-site-recovery-kabtel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kabtel.mk\/en\/solutions\/nakivo-data-protection-site-recovery-kabtel\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kabtel.mk\/en\/solutions\/nakivo-data-protection-site-recovery-kabtel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kabtel.mk\/en\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/kabtel.mk\/en\/solutions\/"},{"@type":"ListItem","position":3,"name":"Data Protection"}]},{"@type":"WebSite","@id":"https:\/\/kabtel.mk\/en\/#website","url":"https:\/\/kabtel.mk\/en\/","name":"KABTEL","description":"We make IT work","publisher":{"@id":"https:\/\/kabtel.mk\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kabtel.mk\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kabtel.mk\/en\/#organization","name":"KABTEL dooel","url":"https:\/\/kabtel.mk\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kabtel.mk\/en\/#\/schema\/logo\/image\/","url":"https:\/\/kabtel.mk\/wp-content\/uploads\/2021\/10\/cropped-logo-20-goini-KABTEL-kocka.png","contentUrl":"https:\/\/kabtel.mk\/wp-content\/uploads\/2021\/10\/cropped-logo-20-goini-KABTEL-kocka.png","width":512,"height":512,"caption":"KABTEL dooel"},"image":{"@id":"https:\/\/kabtel.mk\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Kabtelgroup","https:\/\/x.com\/Kabtel","https:\/\/www.instagram.com\/kabtel.mk\/","https:\/\/www.linkedin.com\/company\/377487\/admin\/","https:\/\/www.youtube.com\/channel\/UCleLLF47J_M1VL2m3m0nKxw"]}]}},"_links":{"self":[{"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/pages\/729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/comments?post=729"}],"version-history":[{"count":20,"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/pages\/729\/revisions"}],"predecessor-version":[{"id":8822,"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/pages\/729\/revisions\/8822"}],"up":[{"embeddable":true,"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/pages\/721"}],"wp:attachment":[{"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/media?parent=729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}