Blog Archives

The Architectures behind Cloud Storage

Each of the major cloud providers deliver at least three different types of cloud storage; high performance, archive and cold storage. Each of these storage types share the pay-as-you-go cloud expectation but each differ in terms of cost and performance.

Tagged with: , , , , , , , ,
Posted in Blog

The Top 5 Reasons VMware Backups Still Break

Lack of Auto-Discovery Lack of auto-discovery is an issue for most backup solutions. As virtual machines and physical hosts are constantly being added to a VMware environment, many backup applications can’t auto-discover them. This means a new VM can go

Tagged with: , , , , , , , , , ,
Posted in Blog

The Math Behind Storage Architecture Design

The speed at which the data center is evolving is forcing IT to sacrifice proper storage architecture design. IT is just trying to keep its head above water; it doesn’t have time to swim. This reality leads to a primary

Tagged with: , , , , , , , , , ,
Posted in Blog

Securing Backups from Ransomware

Ransomware “developers” know that organizations are likely to count on their backups as a primary point of recovery if they are infected. As a result, these malware programs attempt to encrypt or disrupt backup operations. Other cyber attacks may even

Tagged with: , , , , , , , , , ,
Posted in Blog

Next Generation Networks Are Faster

The modern data center is very demanding of its network infrastructure. Next-generation networks need to be more than fast. They also need to be smarter and provide deep insight. Speed seems like an obvious requirement, but there is more to

Tagged with: , , , , , , , , ,
Posted in Blog

Cyber-Secure Storage Requires More Than Encryption

Encryption is a fundamental element of building a secure storage system, but organizations need more than just encryption. Encryption works when the outside attacker can’t authenticate themselves, but if the outside attacker can compromise a user or admin account, then

Tagged with: , , , , , , ,
Posted in Blog

Current Data Protection Infrastructure Is Broken

Some of the more sizeable shifts in the data center include the move from Mainframes to Open Systems and network computing, the move to client-server computing, and the move to a virtualized server infrastructure. Each of these shifts spawned several

Tagged with: , , , , , , , ,
Posted in Blog

Do You Need to Protect Cloud-Native Applications?

One of the forgotten elements of migrating an application to the cloud is protecting that application and its data. There sometimes is an assumption that the cloud automatically protects itself and for natural disaster protection, that assumption is correct. Most

Tagged with: , , , , , , , , ,
Posted in Blog

Should You Protect Unstructured Data Differently?

The focus of backup is now on unstructured data instead of databases. Indeed, protection of databases is as important as it ever has been, but the backup process is probably not the right way to protect that data. Organizations have

Tagged with: , , , , , , ,
Posted in Blog