There has been a lot, too much maybe, discussion about ransomware and its impact on business. Ransomware is a threat but it is only one of the reasons organizations should protect user endpoints and servers. In a recent Storage Switzerland…
There has been a lot, too much maybe, discussion about ransomware and its impact on business. Ransomware is a threat but it is only one of the reasons organizations should protect user endpoints and servers. In a recent Storage Switzerland…
Hardly a week goes by where an IT professional doesn’t hear “storage is growing,” to which they probably roll their eyes and think “no kidding.” What IT needs is more than just appreciation of the problem is a solution to…
The data protection process has three key costs; the software that protects data; the hardware that drives that software and stores protected copies of data and the administration time required to manage the process. The upfront costs are a challenge…
In our on demand webinar, “Designing Storage Architectures for Data Privacy, Compliance and Governance” we discuss the impact of regulations like the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) on storage architectures. One of…
In our on demand webinar, “2019 Storage Strategies Series – What’s Your Plan for Object Storage?” one of the key points of discussion will be about the cloud. Most cloud providers have a tier of storage built from object storage…
The combined value of files that an organization creates and stores is higher than its most mission-critical applications. The ability to collaborate, share and retain files both within and outside the organization dictates how competitive that organization is in its…
In our on demand webinar “The Elephant in the Data Center – Protecting, Managing and Leveraging Unstructured Data”, Storage Switzerland and Igneous discuss the recent 2018 State of Unstructured Data Management report. The report is available as an attachment to…
The method that IT uses to protect applications is changing. Gone are the days of three or four mission critical applications. Today the backup team at most data centers needs to concern itself with protecting dozens if not hundreds of…