Blog Archives

Why SDN Should be Part of Your Cloud Strategy

Organizations are incorporating public cloud resources into their deployment strategies. The organization may have a cloud-first initiative, or it may use the cloud as determined by the workload but the reality is that an overwhelming number of organizations deploy in

Tagged with: , , , , , , , , , ,
Posted in Blog

eBook: Developing a Holistic Storage Security Strategy

The target of most cyber-attacks, like ransomware, is eventually the primary storage system that stores the organization’s most valuable data. If an attacker compromises the organization’s data, they either attempt to restore the data from backups or pay a ransom

Tagged with: , , , , , , , ,
Posted in Blog

Re-setting the Bar for VMware Backups in the Cloud Era

In a world where IT is scrutinized based on the bottom line, it’s easy to deprioritize disaster recovery. Building out, refreshing and managing a dedicated infrastructure for disaster recovery requires significant capex investment and compounds the already heavy burden of

Tagged with: , , , , , , , , , , ,
Posted in Blog

What Makes SSDs Different?

It is easy to assume that all SSDs are created equal. The reality is there are two distinct types of SSDs. One set is created for the client market and the other for the data center. The use cases between

Tagged with: , , , , , ,
Posted in Blog

Designing Backups for Data Privacy and Ransomware

Two external factors are forcing organizations to rethink their backup process and how they store backup data. The first is the ever-increasing threat of ransomware, which encrypts production data forcing the customer to pay for a “key” to decrypt it.

Tagged with: , , , , , , , , , , ,
Posted in Blog

The Advantages of a Diverse Storage Architecture

In the last three blogs, we’ve looked at how IT might consolidate storage by purchasing a single large array and using software-defined storage or using hyper-converged infrastructure. While each option has potential, each option also falls short in some areas.

Tagged with: , , , , , , , , , ,
Posted in Blog

How to Create a Secure End-to-End Storage Infrastructure

Security breaches are a constant threat to organizations, and while securing primary storage is a top priority another challenge is making sure data is secure as various processes copy it. Organizations copy data for many legitimate reasons; backup, test-dev, and

Tagged with: , , , , , , ,
Posted in Blog

Navigating the Performance Marketing Hype for True Flash Value

For years, the storage industry has hailed the advent of the all-flash data center. With growing pressure from lines of business to obtain more sophisticated and real-time analytics for competitive advantage, with declining price points and increasing density of solid-state

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

Backup Endpoints So You Can Wipe Them

One of the best reasons to backup endpoints like laptops, tablets and smartphones has nothing to do with restores, it has to do with deletion. Endpoints are the most vulnerable to theft. They are left in airport security lines, Starbucks

Tagged with: , , , , , , ,
Posted in Blog