Blog Archives

Three Steps to Simplify Your Transition to the Hybrid Cloud

The hybrid cloud, whereby data and workloads can exist, be migrated and orchestrated across on-premises private and off-premises clouds, is by and large the end goal of most IT organizations today. One size does not fit all when it comes

Tagged with: , , , , , , , , ,
Posted in Blog

Is Enterprise File Sync and Share the Same as Data Protection?

Enterprise file sync and share (EFSS) services enable files that are stored either in an on-premises storage array or a cloud service, to be shared among multiple users and accessed by remote endpoint devices or desktops. Enterprise-grade EFSS services designed

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

Kaminario Drives Composable Storage 2.0

Accelerated performance and usage-based storage for business critical applications A new generation of composable infrastructure that is truly software-only is required to deliver the levels of multi-cloud data mobility, automation, efficiency and flexibility, which are required by modern workloads. These

Tagged with: , , , , , , , ,
Posted in Blog

You Will be Breached – What’s Next for Recoverability?

As ransomware variants grow in number and sophistication, it is practically inevitable that enterprises will be breached. Users are becoming more aware, but eventually there will be some users in the enterprise that click on something they shouldn’t. At the

Tagged with: , , , , , , , , , ,
Posted in Blog

How Can I Cut Storage Costs?

Cutting storage costs is not a straightforward equation. There are many variable factors that impact the total cost of ownership (TCO) of a storage infrastructure. In this blog, we will provide a few things that IT professionals can do to

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Cloud Endpoint Protection: Potential Pitfalls to Avoid

Backing up endpoint data is no longer a nice-to-have. Leaving endpoints unprotected leaves critical enterprise data vulnerable to malware, deletion, theft or corruption, and to running afoul of data privacy regulations. This can quickly result in a tarnished brand reputation,

Tagged with: , , , , , , , , , ,
Posted in Blog

Why Workload Modeling and Monitoring for NVMe-oF?

When migrating to new technology, it is always important to conduct a careful cost/benefit analysis, to understand what the return on the new investment will be. It is also necessary to be sure that the investment will provide desired outcomes

Tagged with: , , , , , , , , , , , ,
Posted in Blog

What is Next-Generation Copy Data Management?

Copy data management (CDM) stands to save enterprises significant time and money and at the same time enhance disaster recovery. CDM software works by capturing a “golden master” copy of production data, and then creating and orchestrating the presentation of

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Tired of Backup Storage Capacity Planning? Look to the Cloud

As recently discussed by Stephen Aldous, Principal Product Manager for Carbonite, and George Crump, Storage Switzerland’s Lead Analyst, backup purchases are difficult to budget for and are often an afterthought. Additionally, backup infrastructure typically jumps from periods of underutilization, to

Tagged with: , , , , , , , , , , ,
Posted in Blog