Blog Archives

How to Prepare for the Next WannaCry

WannaCry was a wakeup call. New ransomware strains are now appearing every week because ransomware is a profitable “business.” There will be another attack and the chances of your organization being infected are high. The time is now to take

Tagged with: , , , , , , , ,
Posted in Blog

Testing is the Key to Ransomware Success

IT’s goal should be to never pay a ransom as a result of a ransomware attack. To achieve that goal requires prevention, preparation and practice. Unfortunately, practice is the element most overlooked but potentially the most critical. Why Ransomware Testing

Tagged with: , , , , , ,
Posted in Blog

How to Make DR Testing Less Painful

While every IT professional will admit that it is important, disaster recovery testing generally falls to the bottom of the IT to do list, right after root canal. But if testing is not a key component, the process of creating

Tagged with: , , , , , , , , ,
Posted in Blog

Why Do All-Flash Arrays Need QoS?

If all-flash arrays provide instant, unlimited performance, why manage how much of that performance they deliver through techniques like quality of service (QoS)? For most organizations one of the attractions to all-flash arrays is the set and forget answer to

Tagged with: , , , , , , , , , , ,
Posted in Blog

Storage Problems Limit Hyperconverged Scale

Hyperconvergence has a real problem. It can’t scale. While hyperconverged architectures may be a good match for medium sized business, as the environment scales it’s “all for one, one for all” simplicity becomes problematic. As is usually the case, storage

Tagged with: , , , , , , , ,
Posted in Blog

How To Create an Always Predictable Data Center

The modern data center must not only be predictable for normal production operations but also in failed state situations. An “Always Predictable” storage architecture is key to enabling IT to meet the various service levels the organization requires. The Predictable

Tagged with: , , , , , , , , ,
Posted in Blog

Is your Windows Backup Server at Risk of Ransomware?

Your Windows-based backup server may be at risk to ransomware. That was the take away from a recent talk on ransomware at the VeeamOn conference in New Orleans. A ransomware attack could either begin at your Windows-based backup server or

Tagged with: , , , , , ,
Posted in Blog

What is the Data Protection Problem?

Users demand a seamless digital experience. When something goes wrong they expect their data and applications to quickly return, preferably without them ever knowing something went wrong in the first place. For IT this seamless expectation means data has to

Tagged with: , , , , , , , ,
Posted in Blog