Blog Archives

What are Ransomware Attack Loops and How to Prevent Them – Asigra Briefing Note

Ransomware is the “new” disaster with which every data center, regardless of location, needs to be concerned. IT must take steps to protect the organization’s data, and even its brand from ransomware. A successful defense against ransomware requires user training

Tagged with: , , , , , , , ,
Posted in Briefing Note

Webinar: Backup vs. Ransomware – 5 Requirements for Backup Success

Ransomware is the universal threat. No matter an organization’s data center location, or its size, it can be devastated by a ransomware attack. While most organizations focus on the periphery, they also need to be prepared for a breach, something

Tagged with: , , , , , , ,
Posted in Webinar

Webinar: Faster, Smarter, Simpler – The New Requirements in Storage Networking

IT professionals need a faster, smarter and simpler storage architecture. Organizations drive this need by deploying more diverse and demanding applications and services. Data is the very lifeblood of an increasing number of organizations. The consumers of this data need

Tagged with: , , , , , ,
Posted in Webinar

Webinar: Three Steps to Multi-Vendor Storage Excellence

Most data centers have given up on the idea of a single storage system for all the organization’s workloads. Organizations have decided to buy storage systems that solve a specific problem. The multi-vendor storage environment does have some advantages. Individual

Tagged with: , , , , , , , ,
Posted in Webinar

Webinar: The Three Reasons Cloud Backup is Broken and How to Fix It

The cloud was supposed to be the answer to IT’s backup dilemma; instead, it in some ways has made the situation worse. In this on demand webinar Storage Switzerland and Microsoft Azure have a roundtable discussion on what’s gone wrong

Tagged with: , , , , , , ,
Posted in Webinar

Unstructured Data Backup and GDPR

Because of its sheer size, both in capacity and number of files, protecting unstructured data is a top concern for many organizations. The European Union’s General Data Protection Regulation (GDPR) as well as the growing concern over data privacy worldwide

Tagged with: , , , , ,
Posted in Blog

Not all Cloud NAS are the Same – Understanding Cloud NAS Architectures

Unprecedented data growth, increased demands for performance and new use cases like analytics and IoT are pushing Network Attached Storage (NAS) to the breaking point. Organizations are looking to cloud storage to help them solve the problem and stop the

Tagged with: , , , , , , , , ,
Posted in Blog

What is a Recovery Capabilities Assessment?

Disaster recovery planning (DRP) is a long and arduous process. The process of creating and even updating a disaster recovery plan is the primary reason that most plans, if they exist, are woefully out of date. In the event of

Tagged with: , , , , , , , , , , ,
Posted in Blog

Making Cloud Backup Work for Enterprises

Cloud backup is an ideal complement to an enterprise’s existing backup strategy. The problem is most cloud backup solutions seek to replace the solution already in place. Enterprises don’t want to throw away years of investment in training and processes

Tagged with: , , , , , , , , , ,
Posted in Blog

Designing a Cloud Strategy for the Real World – SoftNAS Briefing Note

The path to Hybrid IT is messy. The on-premises data footprint continues to grow at an alarming rate. On-premises applications also continue to sprawl, and the number of critical workloads only increases. Moving an application to the cloud often requires

Tagged with: , , , , , , ,
Posted in Briefing Note