Blog Archives

You Will be Breached – What’s Next for Recoverability?

As ransomware variants grow in number and sophistication, it is practically inevitable that enterprises will be breached. Users are becoming more aware, but eventually there will be some users in the enterprise that click on something they shouldn’t. At the

Tagged with: , , , , , , , , , ,
Posted in Blog

How Can I Cut Storage Costs?

Cutting storage costs is not a straightforward equation. There are many variable factors that impact the total cost of ownership (TCO) of a storage infrastructure. In this blog, we will provide a few things that IT professionals can do to

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Cloud Endpoint Protection: Potential Pitfalls to Avoid

Backing up endpoint data is no longer a nice-to-have. Leaving endpoints unprotected leaves critical enterprise data vulnerable to malware, deletion, theft or corruption, and to running afoul of data privacy regulations. This can quickly result in a tarnished brand reputation,

Tagged with: , , , , , , , , , ,
Posted in Blog

Why Workload Modeling and Monitoring for NVMe-oF?

When migrating to new technology, it is always important to conduct a careful cost/benefit analysis, to understand what the return on the new investment will be. It is also necessary to be sure that the investment will provide desired outcomes

Tagged with: , , , , , , , , , , , ,
Posted in Blog

What is Next-Generation Copy Data Management?

Copy data management (CDM) stands to save enterprises significant time and money and at the same time enhance disaster recovery. CDM software works by capturing a “golden master” copy of production data, and then creating and orchestrating the presentation of

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Tired of Backup Storage Capacity Planning? Look to the Cloud

As recently discussed by Stephen Aldous, Principal Product Manager for Carbonite, and George Crump, Storage Switzerland’s Lead Analyst, backup purchases are difficult to budget for and are often an afterthought. Additionally, backup infrastructure typically jumps from periods of underutilization, to

Tagged with: , , , , , , , , , , ,
Posted in Blog

What is the Best Way to Store Inactive Data?

In today’s data deluge, it is a challenge for IT professionals to get a comprehensive and confident grasp on all of the data that their organization is storing – never mind how that data is actually being used. The reality

Tagged with: , , , , , , , , , , , ,
Posted in Blog

MeetTheCEO: Quantum’s Jamie Lerner

Video and digital content is quickly growing to comprise a majority of the world’s data. Media and entertainment companies in particular are ingesting videos at the fastest streaming performance, sharing high-resolution content in real time, and protecting and preserving these

Tagged with: , , , , , , , , ,
Posted in Webinar

How to Avoid Cloud Backup Pitfalls

Data protection becomes more challenging as enterprises become more distributed. Data is distributed across core and edge data center environments, and on and off-premises applications and infrastructure resources. This data must be readily accessible by users regardless of their location

Tagged with: , , , , , , , , , , , ,
Posted in Blog