Blog Archives

How to Stop Ransomware Before The Damage Is Done

NTP Software Defendex™ Product Analysis Ransomware is, for good reason, top of mind right now. Most strategies under discussion now are actually responses, not analysis and elimination. And, because ransomware is such a profitable “business,” new versions will continue to

Tagged with: , , , , , , , , ,
Posted in Blog

Is it Time to De-Tape Your Archive?

Enterprises want more value from their archived data assets but tape doesn’t really enable the real-time archive that organizations need. The challenges is that any enterprise in existence for 10 years or longer more than likely has terabytes, even petabytes,

Tagged with: , , , , , , , , ,
Posted in Article

Webinar: 15 Minute Ransomware Survival Guide

Ransomware is a new threat, and new threats require new strategies. Within the first 15 minutes this webinar will provide you key strategies for surviving a ransomware attack. During the event Storage Switzerland and Commvault cover the three P’s of

Tagged with: , , , , ,
Posted in Webinar

Does Disk Based Backup Require Deduplication Anymore?

Hardware-based deduplication legitimized the concept of backing up to disk. But deduplication alone is no longer as important as it used to be. The problem with hardware-based duplication is the data must be transferred to the backup appliance prior to

Tagged with: , , , , , , , , , ,
Posted in Blog

How To Beat Ransomware But Not Your Budget

The solution to ransomware is real-time data protection. The moment data changes it needs to be copied to a secondary storage system and sequestered from primary storage. Then, if a ransomware virus attacks, the last known good copy can be

Tagged with: , , , , , , ,
Posted in Blog

Webinar: 5 Steps To The Perfect Storage Refresh

An Independent Process for Assessing & Refreshing Storage Every data center eventually needs to increase capacity, resiliency, performance or the cost efficiency of its storage architecture. It needs to refresh storage infrastructure. The problem is that most organizations don’t have

Tagged with: , , , , , , , ,
Posted in Webinar

Why is Encryption Key Ownership So Important?

When it comes to encryption, IT is constantly being told to “own the keys.” But why? Isn’t it OK if your provider owns the keys? Encryption keys are how you unlock encrypted data. Whoever or whatever owns the keys has

Tagged with: , , , , ,
Posted in Blog