What is the default retention policy for your backups? If you are like most organizations we speak to, the answer is typically three or more years. The next question is why, as in why is your backup retention so long?…
What is the default retention policy for your backups? If you are like most organizations we speak to, the answer is typically three or more years. The next question is why, as in why is your backup retention so long?…
As part of our “2019 Strategies Series”, Storage Switzerland hosted a panel discussion “What’s Your Plan for Object Storage”, to help organizations create and implement an object storage strategy. Experts from Caringo, Cloudian and Scality joined Storage Switzerland for a…
Endpoints are a growing concern for enterprises, more employees have them (most have two or three), users store more data on them than ever (30% of that data is unique) and the data on these endpoints are within the scope…
Scale-out storage systems tend to protect data from media failure in one of two ways; they either use replication or erasure coding. Replication creates a user-defined number of copies of data, typically a minimum of three, as it is created…
Countless IT processes count on copies of data. Backup is an obvious example, but test/dev, analytics processing, reporting, and file auditing are others. Various studies have indicated that copy data can consume as much as 10X the space consumed by…
Legacy storage network architectures can’t keep up with the scale and performance requirements of modern data sets and workloads such as the Internet of Things (IoT) analytics, creating the need for transformation to support new business demands. Fibre Channel is…
A surprising number of organizations and users consider their file sync and share (FSS) solution to be a suitable replacement for backup. With an FSS solution if a user accidentally deletes a file the FSS service can provide the user…
The previous blog in this series outlined the advantages of a diverse storage infrastructure; flexibility, workload specific performance, and hard-cost savings. The challenge with a diverse storage infrastructure is how to manage it. In prior blogs, we’ve looked at several…
One of the top ways that data “leaks” out of an organization is through the endpoints (laptops, tablets, and smartphones) of departing users. IT should, of course, do what it can to prevent data leakage, but it also should make…