Flash Storage

Flash Storage

Why Not Build Ransomware Proof Storage? - The best way to protect an organization from a ransomware attack is at its source, primary storage. Ransomware works by compromising a user account and then encrypting all the files that the account can access. A compromised superuser account is
Does Disk Based Backup Require Deduplication Anymore? - Hardware-based deduplication legitimized the concept of backing up to disk. But deduplication alone is no longer as important as it used to be. The problem with hardware-based duplication is the data must be transferred to the backup appliance prior to
How To Beat Ransomware But Not Your Budget - The solution to ransomware is real-time data protection. The moment data changes it needs to be copied to a secondary storage system and sequestered from primary storage. Then, if a ransomware virus attacks, the last known good copy can be
How Can Object Storage Recall as fast as Primary Storage? - How can a cost effective, low cost object storage system also provide fast recalls? These systems are not typically designed for performance but IT professionals are told time and time again to archive to object storage because of its cost
Does All-Flash Eliminate the need for Database Tuning? - Database administrators (DBAs) spend a large portion of their day optimizing databases. Do all-flash arrays eliminate that need? While in most cases, the answer to any IT question is “it depends”, in this instance the answer is an emphatic NO!.
Why Backups Can’t Protect Against Ransomware - Ransomware is a new type of threat. As a result it needs a new type of defense. The reason is simple: Backups are not enough to protect against ransomware. They are increasingly victims of the attack themselves, and they don’t
How to Get More from All-Flash Using Software Defined Storage - Flash often makes the hardware selection less important, but makes the software selection very important. The right software can not only ensure optimal flash performance, but also extend flash implementation beyond the typical high-transaction database use cases and into modern
What is Ransomware? - Ransomware is one of the biggest threats facing IT. What exactly is ransomware? Ransomware is a program that once installed in a system encrypts an organization’s data and the only way to get it unencrypted is to pay a fee
Deep Dive XtremIO X2 – Dell EMC World 2017 - The press releases are out there but they only cover the XtremIO announcement at a high level. It’s time for a deeper dive. At Dell EMC World, Storage Switzerland spent quality time on the XtremIO X2 update. It promises increased
Dell EMC Delivers Data Domain Virtual Edition 3.1 for In-Cloud Data Protection - One of the first announcements out of the chute at Dell EMC World 2017 is an updated version of Data Domain’s Virtual Edition (DD VE). The new version runs in both Amazon and Azure clouds and is designed to provide

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s