Blog Archives

Using the Cloud Data Fabric for Data Protection

Most organizations use data protection as their first step into the cloud. Unfortunately, that first step, like many first steps, often results in a stumble. If organizations don’t create a cloud data fabric first, they often use an extension to

Tagged with: , , , , , , , , , , ,
Posted in Blog

Making Primary Storage Fulfill the 3-2-1 Rule

The 3-2-1 rule states that an organization should have three copies of data on two different types of media, with IT storing one copy off-site and preferably offline. Traditionally, organizations count on the backup process to meet the 3-2-1 rule’s

Tagged with: , , , , , , , , ,
Posted in Blog

SlideShare: How to Create a Great Disaster Recovery Plan

Many studies indicate that organizations have a shallow confidence level in their ability to recover from a disaster. The disaster recovery plan is often an ad-hoc plan that requires IT to scramble when disaster strikes. If the recovery effort succeeds,

Tagged with: , , , , , , , ,
Posted in Slideshare

Building a Better Backup Appliance – iXsystems Briefing Note

When it comes to storing backup data, IT professionals have a lot of options from which to choose. Dedicated backup appliances tend to be the most popular selection. Another option is using the backup software’s built-in storage capabilities and building

Tagged with: , , , , , , , ,
Posted in Briefing Note

Webinar: Using the Cloud to Fix Backup’s Blind Spot – Endpoint Data Protection

Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on

Tagged with: , , , , , , ,
Posted in Webinar

Breach – Preparing Cyber-Secure Storage for the Inevitable

The goal of cyber-secure storage is to eliminate attempts to breach an organization’s storage and access its data. The prior three blogs describe methods IT can take to better protect the organization’s data assets; however, despite all the best efforts,

Tagged with: , , , , , , , ,
Posted in Blog

The Problems with Big Box Storage Consolidation

Big box storage consolidation aims to eliminate all of an organization’s storage systems. A big box consolidator is a single system with both flash and hard disk drive media. These systems also leverage DRAM as an acceleration tier. A single

Tagged with: , , , , , , , , ,
Posted in Blog

How to Reduce the TCO of Data Protection Infrastructure

The growth of primary storage has an exponential effect on data protection infrastructure. Demands to protect data more frequently, recover faster and retain data longer promise to make the situation worse. The total cost of ownership (TCO) of the data

Tagged with: , , , , , , , ,
Posted in Blog

Webinar: Why Cloud Migrations Fail – Learn the Keys to Cloud Success

Many cloud migration and cloud first strategies fail to live up to expectations. The problem is organizations spend too much time on micro issues like product selection and not enough time on big picture items like the cloud strategy’s foundation.

Tagged with: , , , , , , , , ,
Posted in Webinar

SlideShare: What’s Breaking Your VMware Backups? And How You Can Fix Them Quickly

Backing up VMware successfully has always been a challenge. The introduction of the cloud ever increasing scale of VMware infrastructure continues to give backups fits and makes it even harder. Please join George Crump, Lead Analyst at Storage Switzerland and

Tagged with: , , , , , , , , , ,
Posted in Slideshare