Blog Archives

Why Cloud Backup Doesn’t Work for Enterprises and How to Fix it

Protecting the enterprise remains a big challenge facing data centers. Backup touches and interacts with almost every component of the data center, and in the enterprise where there are more of those components; the chance for failure is high. At

Tagged with: , , , , , , , ,
Posted in Blog

Do You Need to Backup Office 365?

Office 365 lives in Microsoft’s Azure cloud service. That service consists of more than one location and certainly more than one server. Microsoft does an excellent job of keeping the service available, and to most users, it feels like it

Tagged with: , , , , , , , , , , ,
Posted in Blog

The Top Three Cloud Recovery Concerns

The cloud reduces an organization’s disaster recovery (DR) costs while at the same time upgrading its quality. Cloud DR has a mathematical advantage over internal DR. The organization doesn’t have to invest in a DR site nor does it need

Tagged with: , , , , , , , ,
Posted in Blog

Is Encryption Overrated

When the subject of data security comes up, it often begins, and unfortunately, ends with encryption. Indeed, encrypting data is critical, but in most cases, if the hacker or malware program compromises a user or administrator account, then more than

Tagged with: , , , , , ,
Posted in Blog

DRaaS is For More Than Just Disasters

Disaster Recovery as a Service (DRaaS) enables organizations to improve the recovery response time and lower disaster plan costs. In our recent on demand webinar we not only discussed the value of DRaaS we also provided a live demo of

Tagged with: , , , , , , , ,
Posted in Blog

Using the Cloud Data Fabric for Data Protection

Most organizations use data protection as their first step into the cloud. Unfortunately, that first step, like many first steps, often results in a stumble. If organizations don’t create a cloud data fabric first, they often use an extension to

Tagged with: , , , , , , , , , , ,
Posted in Blog

Making Primary Storage Fulfill the 3-2-1 Rule

The 3-2-1 rule states that an organization should have three copies of data on two different types of media, with IT storing one copy off-site and preferably offline. Traditionally, organizations count on the backup process to meet the 3-2-1 rule’s

Tagged with: , , , , , , , , ,
Posted in Blog

Breach – Preparing Cyber-Secure Storage for the Inevitable

The goal of cyber-secure storage is to eliminate attempts to breach an organization’s storage and access its data. The prior three blogs describe methods IT can take to better protect the organization’s data assets; however, despite all the best efforts,

Tagged with: , , , , , , , ,
Posted in Blog

The Problems with Big Box Storage Consolidation

Big box storage consolidation aims to eliminate all of an organization’s storage systems. A big box consolidator is a single system with both flash and hard disk drive media. These systems also leverage DRAM as an acceleration tier. A single

Tagged with: , , , , , , , , ,
Posted in Blog