The speed at which the data center is evolving is forcing IT to sacrifice proper storage architecture design. IT is just trying to keep its head above water; it doesn’t have time to swim. This reality leads to a primary…
The speed at which the data center is evolving is forcing IT to sacrifice proper storage architecture design. IT is just trying to keep its head above water; it doesn’t have time to swim. This reality leads to a primary…
Ransomware “developers” know that organizations are likely to count on their backups as a primary point of recovery if they are infected. As a result, these malware programs attempt to encrypt or disrupt backup operations. Other cyber attacks may even…
The four walls of the data center no longer confine users, applications, and data. Organizations are multi-site, and users want to work from anywhere. Making “work from anywhere” a reality still requires data and data still has gravity. Data has…
Encryption is a fundamental element of building a secure storage system, but organizations need more than just encryption. Encryption works when the outside attacker can’t authenticate themselves, but if the outside attacker can compromise a user or admin account, then…
Some of the more sizeable shifts in the data center include the move from Mainframes to Open Systems and network computing, the move to client-server computing, and the move to a virtualized server infrastructure. Each of these shifts spawned several…