Blog Archives

Webinar: How To Make Data Center Storage Better Than The Cloud

A compelling reason to move applications to the cloud is how easy providers make storage management. To the users, cloud storage seems frictionless. They just “order-up” the capacity and performance they need, and the cloud gives it to them. Behind

Tagged with: , , , , , , ,
Posted in Webinar

SlideShare: Faster, Smarter, Simpler – The New Requirements in Storage Networking

IT professionals need a faster, smarter and simpler storage architecture. Organizations drive this need by deploying more diverse and demanding applications and services. Data is the very lifeblood of an increasing number of organizations. The consumers of this data need

Tagged with: , , , , , ,
Posted in Slideshare

Performance vs. Security vs. Management – How to Solve the Primary Storage Paradox

Applications and users demand unprecedented levels of performance, cyber-threats like ransomware require new levels of security and access control, and organizations are intolerant of any form of downtime or data loss. At the same time, they need to manage data

Tagged with: , , , , , , , , , ,
Posted in Article

Webinar: What’s Breaking Your VMware Backups? And How You Can Fix Them Quickly

Backing up VMware successfully has always been a challenge. The introduction of the cloud ever increasing scale of VMware infrastructure continues to give backups fits and makes it even harder. Please join George Crump, Lead Analyst at Storage Switzerland and

Tagged with: , , , , , , , , , ,
Posted in Webinar

The Math Behind Storage Architecture Design

The speed at which the data center is evolving is forcing IT to sacrifice proper storage architecture design. IT is just trying to keep its head above water; it doesn’t have time to swim. This reality leads to a primary

Tagged with: , , , , , , , , , ,
Posted in Blog

Securing Backups from Ransomware

Ransomware “developers” know that organizations are likely to count on their backups as a primary point of recovery if they are infected. As a result, these malware programs attempt to encrypt or disrupt backup operations. Other cyber attacks may even

Tagged with: , , , , , , , , , ,
Posted in Blog

True WAN Optimization is not Deduplication – Bridgeworks Briefing Note

The four walls of the data center no longer confine users, applications, and data. Organizations are multi-site, and users want to work from anywhere. Making “work from anywhere” a reality still requires data and data still has gravity. Data has

Tagged with: , , , , , , ,
Posted in Briefing Note

Next Generation Networks Are Faster

The modern data center is very demanding of its network infrastructure. Next-generation networks need to be more than fast. They also need to be smarter and provide deep insight. Speed seems like an obvious requirement, but there is more to

Tagged with: , , , , , , , , ,
Posted in Blog

Cyber-Secure Storage Requires More Than Encryption

Encryption is a fundamental element of building a secure storage system, but organizations need more than just encryption. Encryption works when the outside attacker can’t authenticate themselves, but if the outside attacker can compromise a user or admin account, then

Tagged with: , , , , , , ,
Posted in Blog