Blog Archives

SlideShare: Backup vs. Ransomware – 5 Requirements for Backup Success

Ransomware is the universal threat. No matter an organization’s data center location, or its size, it can be devastated by a ransomware attack. While most organizations focus on the periphery, they also need to be prepared for a breach, something

Tagged with: , , , , , , ,
Posted in Slideshare

Webinar: Eliminate Backups and Simplify DR with Hybrid Cloud Storage

The cloud should be a valuable ally in helping organizations eliminate backup infrastructure and increase their disaster recovery (DR) confidence. The reality is that current cloud backup and DR solutions fall short because they don’t fully exploit cloud resources. Most

Tagged with: , , , , , ,
Posted in Webinar

What to do if Ransomware Strikes a Physical System

With ransomware, unlike almost any other form of disaster, there is an alternative to recovering from backups…pay the ransom. While one can argue the risk associated with paying a ransom, the organization may see it as a viable option. IT

Tagged with: , , , , , , , ,
Posted in Blog

The Challenges of After-The-Fact Encryption

Encryption is a foundational component of a cyber-secure storage system. The problem is that most organizations implement encryption after-the-fact, months if not years after the initial implementation. When IT is considering a new storage system, they tend to focus on

Tagged with: , , , , , , , ,
Posted in Blog

ChalkTalk Video: The SSD Matters

Consumer and Enterprise SSDs, from outward appearances, all look the same. As a result, organizations are sometimes tempted to use consumer SSDs in enterprise use cases or get the least expensive SSD possible. In this ChalkTalk Video, Storage Switzerland’s Lead

Tagged with: , , , , ,
Posted in Video

Lightboard Video: Overcoming The Risk of Virtualizing Tier 1 Workloads

Organizations virtualize more than just standard applications, today businesses mandate the virtualization of mission critical applications like SAP, SAS, Oracle and MS-SQL. Placing these performance dependent applications in a virtualized environment could potentially risk inconsistent performance because they now share

Tagged with: , , , , , , ,
Posted in Video

Designing an All-Flash Data Management Strategy

Thanks to decreasing flash media pricing and data efficiency technologies like deduplication, all-flash arrays are now commonplace in many data centers. In most cases though, the purchases of first generation all-flash arrays were to solve a specific performance problem. Now

Tagged with: , , , , , , , , , ,
Posted in Article

ChalkTalk Video: Key Architecture Requirements for Tackling Hadoop and NoSQL Backup and Recovery

NoSQL and Hadoop typically distribute data through the use of built-in replication technology. The replication process also provides protection from media or server failure. Many IT professionals, as a result, think that they don’t need to backup these environments. In

Tagged with: , , , , , , , , ,
Posted in Video

ChalkTalk Video: Managing Secondary Data Globally

Secondary data continues to grow at an unprecedented pace and organizations are increasingly using that data for purposes beyond backup and archive. IT needs a way to visualize, manage and take action on their secondary data and applications. Organizations also

Tagged with: , , , , , , , , ,
Posted in Video

ChalkTalk Video: On-Premises All-Flash as a Service

One of the advantages of the cloud is organization’s can start a new project with minimal capital outlay. The problem is that as that project matures and moves into production the cost and ability to control the cloud become issues.

Tagged with: , , , , , , ,
Posted in Video