Blog Archives

Bored with Ransomware? Good it is Not the Primary Problem

There has been a lot, too much maybe, discussion about ransomware and its impact on business. Ransomware is a threat but it is only one of the reasons organizations should protect user endpoints and servers. In a recent Storage Switzerland

Tagged with: , , , , , , , , ,
Posted in Blog

Does Your All-Flash Software Provide Data Protection?

Most primary storage systems and software provide some form of data protection. That protection comes in the form of protection from media failure (typically RAID), snapshots and clones. All-Flash Arrays (AFA) seem to provide a better than average level of

Tagged with: , , , , , , , , , , ,
Posted in Blog

Overcoming the Unstructured Data Management Gap

Hardly a week goes by where an IT professional doesn’t hear “storage is growing,” to which they probably roll their eyes and think “no kidding.” What IT needs is more than just appreciation of the problem is a solution to

Tagged with: , , , , , , , , , ,
Posted in Blog

What is Consumption Based Data Protection?

The data protection process has three key costs; the software that protects data; the hardware that drives that software and stores protected copies of data and the administration time required to manage the process. The upfront costs are a challenge

Tagged with: , , , , , , , , ,
Posted in Blog

How the Rights of the Digital Citizen Impacts Storage Infrastructure

In our on demand webinar, “Designing Storage Architectures for Data Privacy, Compliance and Governance” we discuss the impact of regulations like the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) on storage architectures. One of

Tagged with: , , , , , , , , ,
Posted in Blog

Object Storage Vs. The Public Cloud – Friend or Foe

In our on demand webinar, “2019 Storage Strategies Series – What’s Your Plan for Object Storage?” one of the key points of discussion will be about the cloud. Most cloud providers have a tier of storage built from object storage

Tagged with: , , , , , , , , , , ,
Posted in Blog

Designing a File Storage Infrastructure – CTERA Briefing Note

The combined value of files that an organization creates and stores is higher than its most mission-critical applications. The ability to collaborate, share and retain files both within and outside the organization dictates how competitive that organization is in its

Tagged with: , , , , , ,
Posted in Blog

Orchestration is Key to Cloud Disaster Recovery

The cloud is an ideal location from which to execute a disaster recovery. It eliminates the need for a secondary DR site and the processing power required by recovered applications because the organization purchases cloud storage and compute at the

Tagged with: , , , , , , ,
Posted in Blog

Do You Need to Re-Prioritize Unstructured Data Management Priorities?

In our on demand webinar “The Elephant in the Data Center – Protecting, Managing and Leveraging Unstructured Data”, Storage Switzerland and Igneous discuss the recent 2018 State of Unstructured Data Management report. The report is available as an attachment to

Tagged with: , , , , , , , , ,
Posted in Blog

Can Your Service Levels Keep Up With the Application Explosion?

The method that IT uses to protect applications is changing. Gone are the days of three or four mission critical applications. Today the backup team at most data centers needs to concern itself with protecting dozens if not hundreds of

Tagged with: , , , , , , , , , ,
Posted in Blog