Blog Archives

eBook: Developing a Holistic Storage Security Strategy

The target of most cyber-attacks, like ransomware, is eventually the primary storage system that stores the organization’s most valuable data. If an attacker compromises the organization’s data, they either attempt to restore the data from backups or pay a ransom

Tagged with: , , , , , , , ,
Posted in Blog

What Makes SSDs Different?

It is easy to assume that all SSDs are created equal. The reality is there are two distinct types of SSDs. One set is created for the client market and the other for the data center. The use cases between

Tagged with: , , , , , ,
Posted in Blog

Designing Backups for Data Privacy and Ransomware

Two external factors are forcing organizations to rethink their backup process and how they store backup data. The first is the ever-increasing threat of ransomware, which encrypts production data forcing the customer to pay for a “key” to decrypt it.

Tagged with: , , , , , , , , , , ,
Posted in Blog

The Advantages of a Diverse Storage Architecture

In the last three blogs, we’ve looked at how IT might consolidate storage by purchasing a single large array and using software-defined storage or using hyper-converged infrastructure. While each option has potential, each option also falls short in some areas.

Tagged with: , , , , , , , , , ,
Posted in Blog

How to Create a Secure End-to-End Storage Infrastructure

Security breaches are a constant threat to organizations, and while securing primary storage is a top priority another challenge is making sure data is secure as various processes copy it. Organizations copy data for many legitimate reasons; backup, test-dev, and

Tagged with: , , , , , , ,
Posted in Blog

Using Machine Learning to Eliminate Data Center War Rooms – Virtual Instruments Briefing Note

According to Dimensional Research, over 60% of enterprises experience two or more significant application performance issues per month. In the modern data center, most users equate poor performance the same as application downtime. Performance issues, though, are usually much harder

Tagged with: , , , , , , , ,
Posted in Briefing Note

Understanding the AWS Data Protection Market – Cloud Daddy Briefing Note

Organizations should keep a backup of applications running on Amazon Web Services (AWS). Unlike on-premises applications where the primary concern is disaster recovery, the primary motivation for protecting cloud-native applications is recovery from cyber-attacks, rogue users or application faults. Each

Tagged with: , , , , , , , ,
Posted in Briefing Note

Modernizing NAS Instead of Replacing It – Qumulo Briefing Note

Organizations are almost universally struggling with storing and managing their unstructured data. From a storage system perspective, vendors offer legacy NAS systems, object storage systems and cloud storage services, all trying to convince IT professionals that they are the best

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note