Blog Archives

A Collective Hive for HCI – Maxta MxIQ Briefing Note

Hyper-converged Infrastructure (HCI) simplifies many things for busy IT professionals. As their environment grows, HCI automatically scales with it, adding performance and capacity with each additional node. However, an area where HCI falls short, along with many other storage systems,

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

What Ever Happened to the Software Defined Data Center?

About a decade ago, VMware introduced the vision of a software-defined data center (SDDC). Unlike data centers of yesteryear, a software-defined data center was supposed to leverage intelligent software and commodity hardware to create a flexible data center that could

Tagged with: , , , , , , , , , , , ,
Posted in Article

Webinar: Designing Storage Architectures for Data Privacy, Compliance and Governance

Managing data is about more than managing capacity growth; organizations today need to adhere to increasingly strict data privacy, compliance and governance regulations. Privacy regulations like GDPR and California’s Consumer Privacy Act place new expectations on organizations that require them

Tagged with: , , , , , , , , ,
Posted in Webinar

Creating a Data Center Compatible Cloud – Elastifile Briefing Note

Organizations spend months creating a “cloud strategy,” and then spend many more months attempting to execute that strategy, sometimes to successful completion but many times the project is abandoned. There are a multitude of problems when transitioning applications to the

Tagged with: , , , , , , , , ,
Posted in Briefing Note

eBook: Developing a Holistic Storage Security Strategy

The target of most cyber-attacks, like ransomware, is eventually the primary storage system that stores the organization’s most valuable data. If an attacker compromises the organization’s data, they either attempt to restore the data from backups or pay a ransom

Tagged with: , , , , , , , ,
Posted in Blog

What Makes SSDs Different?

It is easy to assume that all SSDs are created equal. The reality is there are two distinct types of SSDs. One set is created for the client market and the other for the data center. The use cases between

Tagged with: , , , , , ,
Posted in Blog

Designing Backups for Data Privacy and Ransomware

Two external factors are forcing organizations to rethink their backup process and how they store backup data. The first is the ever-increasing threat of ransomware, which encrypts production data forcing the customer to pay for a “key” to decrypt it.

Tagged with: , , , , , , , , , , ,
Posted in Blog

The Advantages of a Diverse Storage Architecture

In the last three blogs, we’ve looked at how IT might consolidate storage by purchasing a single large array and using software-defined storage or using hyper-converged infrastructure. While each option has potential, each option also falls short in some areas.

Tagged with: , , , , , , , , , ,
Posted in Blog

How to Create a Secure End-to-End Storage Infrastructure

Security breaches are a constant threat to organizations, and while securing primary storage is a top priority another challenge is making sure data is secure as various processes copy it. Organizations copy data for many legitimate reasons; backup, test-dev, and

Tagged with: , , , , , , ,
Posted in Blog