Blog Archives

Breaking Backup with SaaS

Backup is the one process that almost everyone in IT would opt out of if given the choice. In addition to the IT management burden there is often the burden of the infrastructure itself, a never ending need for more

Tagged with: , , , , , , , , , , , , , , , , ,
Posted in Blog

How to Design a Modern Data Protection Architecture

Data Protection is changing. Today backup software can recover in-place, instantiating volumes directly on the backup storage which enables organizations to significantly reduce recovery windows. Consequently, the performance of the backup storage hardware matters more than ever. At the same

Tagged with: , , , , , , , , ,
Posted in Article

Applying the 3-2-1 Backup Rule to Self-Protecting Primary Storage

Primary storage has two key functions, to deliver data as fast as possible to the applications and users requesting it, and to maintain data accessibility in the event of a hardware failure. Primary storage vendors have attempted to expand their

Tagged with: , , , , , , ,
Posted in Blog

Understanding the Azure Hybrid Cloud On-Ramp

Most organizations approach the cloud without a formal strategy. They pick a pain point, like backup and disaster recovery, as a starting point with the hope of adding more services as they become more cloud savvy. What often happens, however,

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Multi-Cloud versus the Five Requirements of Data – Datrium Briefing Note

Organizations need to meet five core requirements of the data they store; encryption, mobility, performance, retention and disaster recovery. To deliver these elements, IT is often forced to use five or more products just for on-premises data, let alone the

Tagged with: , , , , , , , , ,
Posted in Briefing Note

What is a Cloud-Like Storage Experience for On-Premises Applications?

The public cloud is often described as “just a business model” that provides organizations with the ability to pay for storage and compute resources as they need them. If that were true then the public cloud providers could be easily

Tagged with: , , , , , , , ,
Posted in Blog

How Ransomware and GDPR Break Image Based Backups and How to Fix It

Image based backups, after the initial backup is complete, only backup change blocks within the item they are protecting. The technology enables organizations to frequently backup critical servers and applications. It also enables the protection of file servers with millions

Tagged with: , , , , , , ,
Posted in Briefing Note

The ROI of Extreme Performance

In our recent webinar, “Flash Storage – Deciding Between High Performance and EXTREME Performance”, Storage Switzerland and Violin Systems discussed the use cases that demand extreme performance over high performance. Extreme performance is for applications that can benefit from consistent

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Data Management vs Data Protection

Storing data comes with responsibilities, two of which are managing that data and protecting it. Many organizations however, focus most of their attention on protecting the data and almost no attention to managing it. However, focusing attention solely on data

Tagged with: , , , , , , , , , , , ,
Posted in Blog

How to Make One Thousand Snapshots Useful

Almost every modern storage system claims to support “thousands” of snapshots of production data without impacting performance. While some of the lack of performance impact claims have proven to be suspect, there is little doubt that today’s storage solutions support

Tagged with: , , , , , , , , , , , , ,
Posted in Blog