Blog Archives

SlideShare: Using the Cloud to Fix Backup’s Blind Spot – Endpoint Data Protection

Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on

Tagged with: , , , , , , ,
Posted in Slideshare

SlideShare: Overcoming the Storage Roadblock to Data Center Modernization

Organizations have tried a variety of solutions to regain control of their data storage infrastructure. They’ve invested in monolithic storage systems, software defined storage (SDS) and hyper-converged systems. While each approach may have brought some value, each failed in its

Tagged with: , , , , , , , ,
Posted in Slideshare

What to Look for in Cloud Native Backup

Users and software vendors realize the importance of protecting cloud-native applications. While cloud providers generally do an excellent job of protecting applications from a disaster they don’t provide easy access to tools to provide point-in-time backups which are necessary to

Tagged with: , , , , , , , , , ,
Posted in Blog

The Dirty Little Secret about DRaaS

Disaster Recovery as a Service (DRaaS) is a game changer for many, cloud backup as a service providers. The service enables organizations to stand up instances of their mission critical applications in the provider’s cloud instead of recovering them across

Tagged with: , , , , , , , , ,
Posted in Blog

Webinar: Holistic Disaster Recovery; from Data Center to Endpoint

Most disaster recovery strategies focus exclusively on the data center but most users use laptops and other endpoints to get their work done. And those endpoints often have unique, business critical data on them. Data center servers and storage as

Tagged with: , , , , , , , , , ,
Posted in Webinar

Defining SDN in the Open Networking Era

Software-defined networking (SDN) represents the future of networking. A “software-defined” network enables an organization to virtualize their network, automate operations to enable efficient network configuration, and integrate network functions across dozens of switches creating a unified network architecture that is

Tagged with: , , , , , ,
Posted in Blog

Creating a Data Privacy Protection Architecture

The General Data Protection Regulation (GDPR) forces organizations to evolve from a data protection mindset to a data management mindset. IT can no longer let backups store data on secondary storage as giant blobs of ones and zeros. The process

Tagged with: , , , , , ,
Posted in Blog

Object Storage or Cloud for Enterprise File Sync and Share

Enterprise File Sync and Share (EFSS) is a “must deliver” for IT since most users perceive the capability to be a “must have”. In our last blog we discussed what to look for in an EFSS and explained the advantages

Tagged with: , , , , , , , , , , ,
Posted in Blog

Making NoSQL Protection Operations Driven – Imanis Data Briefing Note

It seems like backup vendors forgot about protecting NoSQL environments. Environments like Cassandra, MongoDB, Hortonworks, Couchbase, and Hadoop all need point-in-time protection. One reason for the lack of data protection solutions for these environments is that there is an assumption

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Does All-Flash Array Software Improve Performance?

The raw performance of a single enterprise flash drive is often higher than 70,000 IOPS. Most all-flash arrays, even though vendors fill them with 12 to 24 flash drives, deliver only a few hundred thousand IOPS. The cause of the

Tagged with: , , , , , , , , ,
Posted in Blog