The case for protecting Office 365 is undeniable. First, Microsoft’s license agreement makes it very clear that the data stored on its service is the user’s and it is the user’s responsibility to protect it. Second, it makes sense to…
The case for protecting Office 365 is undeniable. First, Microsoft’s license agreement makes it very clear that the data stored on its service is the user’s and it is the user’s responsibility to protect it. Second, it makes sense to…
Backup makes a copy of primary data on a secondary storage tier. It then tries to isolate that copy so that it can’t be changed either from external forces like ransomware or internal influences like users. For the most part…
Organizations are now drowning in unstructured data. Addressing the growth and managing this data is increasingly a high priority for organizations. The public cloud has a role to play and vendors must carefully integrate it into their unstructured data protection…
Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical…
In the past most data related regulations focused on data protection and disaster recovery. The European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA), as well as other soon-to-come regulations, continue to have data protection and…
Technically, if an All-Flash Array (AFA) supports hard disk drives, it is no longer an AFA. What if however, the system could start as an AFA and then later, to save costs, move older data to inexpensive, high capacity hard…
NVMe is the next wave of all-flash systems coming to market. These systems are fast, dense and scalable. They promise to fundamentally change the way IT designs storage architectures in support of existing applications, and they open up new possibilities…