All-flash arrays solve many performance problems. But the latency reduction they bring also exposes other weak links in the storage IO architecture. One of the most exposed areas is the network. For example, many times IT will install the flash…
All-flash arrays solve many performance problems. But the latency reduction they bring also exposes other weak links in the storage IO architecture. One of the most exposed areas is the network. For example, many times IT will install the flash…
Downtime, no matter what the cause, is becoming less acceptable to organizations of all sizes. Clearly, technology exists that can eliminate it. But with the reduction or elimination of downtime, the associated costs – when compared to once-per-night backups –…
The best way to protect an organization from a ransomware attack is at its source, primary storage. Ransomware works by compromising a user account and then encrypting all the files that the account can access. A compromised superuser account is…
The reason that file data is a prime target of ransomware attacks is that most file servers are full of juicy targets that organizations are willing to pay to get back. Payment is, after all, exactly what ransomware is all…
One of the challenges to designing a successful disaster recovery solution is where to keep copies of your data. A close copy allows for a rapid recovery in the event of a failure since it is seconds away. But in…
IT needs a proactive way to stop ransomware. It’s here to stay. Most ransomware countermeasures are reactive. The damage is done before IT can deploy their reactive countermeasures. When ransomware gets through an organization’s defenses, it starts to encrypt data,…