Blog Archives

Big Data for Small Enterprises

Big Data is not just for big enterprises. Small to medium-sized enterprises (SME) can reap the same rewards. But SMEs can’t build a Big Data infrastructure like larger enterprises. The good news it they don’t have to, they can leverage

Tagged with: , , , , , , , , ,
Posted in Blog

What are Recovery Time Reality & Recovery Point Reality?

Recovery time reality (RTR) and recovery point reality (RPR) are relatively new terms that relate to recovery time objective (RTO) and recovery point objective (RPO). They refer to the difference between the actual capabilities of your recovery system and the

Tagged with: , , , ,
Posted in Blog

How Do You Improve Your RTO?

Recovery Time Objective (RTO) is the time it takes to recover an application or server so users can login and get back to work. IT is under constant pressure to reduce this time. There are two broad methods you can

Tagged with: , , , , , , ,
Posted in Blog

Where Should Copy Data Reside?

Copy data is getting a lot of attention and solutions to manage it are flooding to market. But a question few of these solutions let you ask is, “WHERE should that copy data reside?” For the most part, they assume

Tagged with: , , , , , , , , , ,
Posted in Blog

Does Flash Eliminate Performance Optimization?

Flash storage is increasingly more affordable, so much so that many organizations are throwing storage infrastructure optimization out the window. Flash is making performance management and tuning a lost art form. The problem is performance management is still very necessary.

Tagged with: , , , , , , , ,
Posted in Blog

How Hybrid Cloud Helps DR

Given the increased threats facing organizations today, a single DR site is no longer good enough. Instead organizations need to apply a hybrid cloud mentality to their disaster recovery strategies. What Will You Fail? The most important data after a

Tagged with: , , , , , , , , , ,
Posted in Blog

How Do You Improve Your RPO?

There are two ways to improve your recovery point objective (RPO): adjust the objective, and adjust your techniques to accomplish that objective. In addition, technically only the first method changes (i.e. improves) your RPO; the second method help you to

Tagged with: , , , , ,
Posted in Blog

Exploiting Ransomware’s Fatal Flaw

Ransomware has one fatal flaw. Organizations that know how to exploit this flaw can almost eliminate this cyber-attack from their list of concerns. Ironically the flaw is found in their very action it takes to hold organizations hostage – it

Tagged with: , , , , , ,
Posted in Blog

Why Not Build Ransomware Proof Storage?

The best way to protect an organization from a ransomware attack is at its source, primary storage. Ransomware works by compromising a user account and then encrypting all the files that the account can access. A compromised superuser account is

Tagged with: , , , , , , , ,
Posted in Blog

How Data Management Protects Against Cyber-Attacks

The reason that file data is a prime target of ransomware attacks is that most file servers are full of juicy targets that organizations are willing to pay to get back. Payment is, after all, exactly what ransomware is all

Tagged with: , , , , , , , , , ,
Posted in Blog