Blog Archives

A Strategy for NVMe All-Flash in 2019

Hybrid Flash Arrays and All-Flash Arrays are fundamentally changing the way IT designs storage architectures. IT can create virtual environments with much higher virtual machine to physical server ratios, scale-up databases to support exponentially more users and add new workloads

Tagged with: , , , , , , , , , , , , ,
Posted in Article

The Questions You’re NOT Asking Your DRaaS Provider

Disaster Recovery as a Service (DRaaS) is an ideal cloud use case. DRaaS uses a cloud provider’s resources and allocates them on-demand to an organization in the midst of a disaster. With DRaaS, organizations no longer need to worry about

Tagged with: , , , , , , , ,
Posted in Article

How to Evolve From Unstructured Data Protection to Unstructured Data Management

A recent report from Igneous, “The State of Unstructured Management 2018,” indicates that most IT professionals are not satisfied with their ability to meet organizational expectations about the backup, recovery, and retention of their unstructured data sets. The value that

Tagged with: , , , , , , , , , , ,
Posted in Article

Keeping Office 365 Data Safe with Veeam and KeepItSafe

Beyond Microsoft’s clear position on data, “it’s your data”, it makes more sense to protect Microsoft Office 365 than potentially any other SaaS platform. Office 365 has on-premises versions, so when IT recovers data on-premises the organization can actually operate

Tagged with: , , , , , , , , , ,
Posted in Article

eBook: If You Can’t Consolidate Storage Manage It

According to several surveys, most data centers have at least six storage systems, and multiple vendors are supplying those systems. If consolidating storage systems is on your IT whiteboard this year, then our new eBook, “Overcoming the Problems with Storage

Tagged with: , , , , , , , , , ,
Posted in Article

Solving The Challenge with Endpoint Data Strategies

Applying data center data management best practices to endpoints is particularly challenging. As discussed in our prior post, there is the physical challenge that most organizations have hundreds if not thousands of endpoints and those endpoints are mobile. Managing and

Tagged with: , , , , , , , , , , , , ,
Posted in Article

How to Backup Office 365

The case for protecting Office 365 is undeniable. First, Microsoft’s license agreement makes it very clear that the data stored on its service is the user’s and it is the user’s responsibility to protect it. Second, it makes sense to

Tagged with: , , , , , , , ,
Posted in Article

Endpoints – From Laptop Backup to Total Data Management

Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical

Tagged with: , , , , , , , , , , , , ,
Posted in Article