Blog Archives

Webinar: Five Things to Look for in Your Next All-Flash Array

The first generation of all-flash arrays has come and gone. For many organizations, the time is now to consider the “next” all-flash array. In our on demand webinar, Storage Switzerland and X-IO Storage discuss five things to look for in

Tagged with: , , , , , , , , , ,
Posted in Webinar

SlideShare: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?

Believe it or not, it has been a year since WannaCry crippled organizations around the world, and since that time ransomware attacks have only accelerated. The ransomware “industry” is now a $5 billion market and is projected to grow to

Tagged with: , , , , , , ,
Posted in Slideshare

Why Protect Data in the Cloud? – Cloud Daddy Briefing Note

The motivation to protect cloud-based applications is different from on-premises applications. Cloud providers like Amazon do a good job of providing a basic level of data protection, including resilience from media failure, snapshots, and multi-cloud replication. The most common cause

Tagged with: , , , , , , ,
Posted in Briefing Note

The Problem with Using Cloud Storage for Long-Term Data Retention – Nexsan Briefing Note

Compared to on-premises archive storage the cloud seems like an ideal place to archive data. An organization can start small, grow incrementally and only pay for the storage they are using. There is a crossover point however where it is

Tagged with: , , , , , , , ,
Posted in Briefing Note

Webinar: The All-Flash Fix – How to Create a Hybrid Storage Architecture

The All-Flash Data Center was supposed to eliminate all storage problems and allow the application architecture to scale to new heights. The problem is data capacities are growing faster than the cost per GB of flash can decrease. Most data

Tagged with: , , , , , , ,
Posted in Webinar

Requirements for a Flash to Flash to Cloud Architecture

The first three chapters presented the flash to flash to cloud architecture as a design that enables an organization to overcome the majority of its primary storage challenges as well as provide a method to improve its data protection and

Tagged with: , , , , ,
Posted in Blog

What are Ransomware Attack Loops and How to Prevent Them – Asigra Briefing Note

Ransomware is the “new” disaster with which every data center, regardless of location, needs to be concerned. IT must take steps to protect the organization’s data, and even its brand from ransomware. A successful defense against ransomware requires user training

Tagged with: , , , , , , , ,
Posted in Briefing Note

Webinar: Backup vs. Ransomware – 5 Requirements for Backup Success

Ransomware is the universal threat. No matter an organization’s data center location, or its size, it can be devastated by a ransomware attack. While most organizations focus on the periphery, they also need to be prepared for a breach, something

Tagged with: , , , , , , ,
Posted in Webinar

Webinar: Faster, Smarter, Simpler – The New Requirements in Storage Networking

IT professionals need a faster, smarter and simpler storage architecture. Organizations drive this need by deploying more diverse and demanding applications and services. Data is the very lifeblood of an increasing number of organizations. The consumers of this data need

Tagged with: , , , , , ,
Posted in Webinar