Spanning’s Matt McDermott details how customers can use a Microsoft Flow feature called Custom Connectors to craft their own solutions with REST API endpoints like the Spanning Backup for Office 365 API.
While moving to O365 brings a host of exciting features and capabilities, rushing into it can lead to a tedious migration and impact the ROI of the solution. Moving to O365 should be viewed from the long-term lens of adoption, rather than a one-time migration, to realize the benefits of its numerous solutions/tools. In this blog we list key pointers for a smooth transition, along with post-migration tips.
What if you want your Google account up and running online again, just as it was before the account was lost or deleted? In this case, you’ll want to fully restore the data from the deleted account to an active account, and you’ll need Spanning’s help to do this.
Spanning Backup makes this type of Google account recovery simple. As always, you can complete your backup and recovery goals in just a matter of clicks:
Hamline University found not only a solid backup and recovery solution in Spanning, but also a trusted partner they can count on no matter what the future of the cloud and education bring. Read their story to learn more about how Spanning Backup helps educational institutions take on cloud applications with confidence.
With self-managed encryption keys, Spanning customers now have full control over their data, allowing them to audit key usage, set key rotation policies and revoke access to data at any time — making all encrypted data unreadable.
Skip the guides for dog-lovers and coffee-drinkers. This Valentine’s Day we are celebrating the sometimes hard-to-shop-for technologist. Read this blog for a few gift ideas from the Spanning Backup team ranging from stickers to books and fun apps.
Cybersecurity is a top priority for organizations. All it takes to infect a network or steal valuable data, is one wrong click by an employee. While employees seem to have good knowledge of basic cybersecurity practices, there are considerable security blind spots which leave the employee and organization vulnerable to breaches. Spanning helps to identify red flags and vulnerabilities in security awareness training for employees.