Blog Archives

Using the Cloud Data Fabric for Data Protection

Most organizations use data protection as their first step into the cloud. Unfortunately, that first step, like many first steps, often results in a stumble. If organizations don’t create a cloud data fabric first, they often use an extension to

Tagged with: , , , , , , , , , , ,
Posted in Blog

Making Primary Storage Fulfill the 3-2-1 Rule

The 3-2-1 rule states that an organization should have three copies of data on two different types of media, with IT storing one copy off-site and preferably offline. Traditionally, organizations count on the backup process to meet the 3-2-1 rule’s

Tagged with: , , , , , , , , ,
Posted in Blog

Breach – Preparing Cyber-Secure Storage for the Inevitable

The goal of cyber-secure storage is to eliminate attempts to breach an organization’s storage and access its data. The prior three blogs describe methods IT can take to better protect the organization’s data assets; however, despite all the best efforts,

Tagged with: , , , , , , , ,
Posted in Blog

The Problems with Big Box Storage Consolidation

Big box storage consolidation aims to eliminate all of an organization’s storage systems. A big box consolidator is a single system with both flash and hard disk drive media. These systems also leverage DRAM as an acceleration tier. A single

Tagged with: , , , , , , , , ,
Posted in Blog

How to Reduce the TCO of Data Protection Infrastructure

The growth of primary storage has an exponential effect on data protection infrastructure. Demands to protect data more frequently, recover faster and retain data longer promise to make the situation worse. The total cost of ownership (TCO) of the data

Tagged with: , , , , , , , ,
Posted in Blog

What to do if Ransomware Strikes a Physical System

With ransomware, unlike almost any other form of disaster, there is an alternative to recovering from backups…pay the ransom. While one can argue the risk associated with paying a ransom, the organization may see it as a viable option. IT

Tagged with: , , , , , , , ,
Posted in Blog

The Challenges of After-The-Fact Encryption

Encryption is a foundational component of a cyber-secure storage system. The problem is that most organizations implement encryption after-the-fact, months if not years after the initial implementation. When IT is considering a new storage system, they tend to focus on

Tagged with: , , , , , , , ,
Posted in Blog

Will Cloud Backup Really Reduce Your Backup Investment?

Organizations make significant investments in their infrastructure. As production data continues to grow, the exponential impact on backup storage threatens to deplete IT budgets. The cloud promises to reduce on-premises backup infrastructure but most solutions only use the cloud to

Tagged with: , , , , , , , , , , ,
Posted in Blog

Does Your Backup Application Support VMware on AWS?

Amazon, through its VMware Cloud on AWS (VMC) service enables organizations to run VMware in Amazon AWS. Organizations can use the service for disaster recovery or to migrate applications to the cloud. The transfer between on-premises and VMC is seamless

Tagged with: , , , , , , , , , ,
Posted in Blog