Blog Archives

What is Intent Based Networking?

Intent-Based Networking moves organizations from reactive networking where everything that happens on a network is in response to something, to proactive networking where everything that happens on a network is to deliver the business goal or the intent. Intent-based networking

Tagged with: , , , , , , ,
Posted in Blog

Protecting Your Data Protection’s Blind Side – Endpoints

Laptops, smartphones, and tablets are how users get work done. A surprising amount of organizational data is stored exclusively on laptops, never touching data center storage. Endpoints are also on the front lines of business where they are the most

Tagged with: , , , , , , , ,
Posted in Blog

The Changing Scope of Disaster Recovery

Disaster Recovery, for most organizations, used to mean making sure that a handful of mission-critical applications were protected and able to be brought back online in the event of a data center failure. The data center of today has changed

Tagged with: , , , , , , , , , , ,
Posted in Blog

The ROI of a Flash and Object Storage Architecture

The flash+object storage architecture creates a cost effective, two tier storage architecture in the data center. It enables IT to better meet performance demands of applications and the retention demands of unstructured data. Ideally the organization can reduce the size

Tagged with: , , , , , , , , , ,
Posted in Blog

Disaster Recovery with Cloud as Primary Storage

The first blog in this series discussed initially using a Cloud as Primary Storage solution for data protection and then in the second blog in the series, transitioning to using the Cloud as Primary Storage to store production data. In

Tagged with: , , , , , , , , ,
Posted in Blog

Why SDN Should be Part of Your Cloud Strategy

Organizations are incorporating public cloud resources into their deployment strategies. The organization may have a cloud-first initiative, or it may use the cloud as determined by the workload but the reality is that an overwhelming number of organizations deploy in

Tagged with: , , , , , , , , , ,
Posted in Blog

eBook: Developing a Holistic Storage Security Strategy

The target of most cyber-attacks, like ransomware, is eventually the primary storage system that stores the organization’s most valuable data. If an attacker compromises the organization’s data, they either attempt to restore the data from backups or pay a ransom

Tagged with: , , , , , , , ,
Posted in Blog

Re-setting the Bar for VMware Backups in the Cloud Era

In a world where IT is scrutinized based on the bottom line, it’s easy to deprioritize disaster recovery. Building out, refreshing and managing a dedicated infrastructure for disaster recovery requires significant capex investment and compounds the already heavy burden of

Tagged with: , , , , , , , , , , ,
Posted in Blog

What Makes SSDs Different?

It is easy to assume that all SSDs are created equal. The reality is there are two distinct types of SSDs. One set is created for the client market and the other for the data center. The use cases between

Tagged with: , , , , , ,
Posted in Blog

Designing Backups for Data Privacy and Ransomware

Two external factors are forcing organizations to rethink their backup process and how they store backup data. The first is the ever-increasing threat of ransomware, which encrypts production data forcing the customer to pay for a “key” to decrypt it.

Tagged with: , , , , , , , , , , ,
Posted in Blog