Blog Archives

Should Experts Convince You to Pay for Ransomware?

I may be an analyst for Storage Swiss now, but for 30 years I’ve also been in the news business. So with the emergence of “WannaCry” I’m seeing my two worlds collide. And it’s no surprise it’s over ransomware. We’ve

Tagged with: , , , , , ,
Posted in Blog

How Do You Stop WannaCry?

Preventing the WannaCry attack is simple. Update Windows. Stopping the next ransomware attack may take more prevention steps. WannaCry leverages exploits that were made public when hackers revealed on April 14 a list of exploits that were allegedly developed by

Tagged with: , , , , ,
Posted in Blog

How Do Disk Backup Appliances Scale?

Eventually most organizations will run out of backup storage, so understanding how backup storage scales is critical to creating a long term data protection strategy. It is not as simple as just converting to a scale-out architecture because deduplication adds

Tagged with: , , , , ,
Posted in Blog

How to Stop Ransomware Before The Damage Is Done

NTP Software Defendex™ Product Analysis Ransomware is, for good reason, top of mind right now. Most strategies under discussion now are actually responses, not analysis and elimination. And, because ransomware is such a profitable “business,” new versions will continue to

Tagged with: , , , , , , , , ,
Posted in Blog

Does Disk Based Backup Require Deduplication Anymore?

Hardware-based deduplication legitimized the concept of backing up to disk. But deduplication alone is no longer as important as it used to be. The problem with hardware-based duplication is the data must be transferred to the backup appliance prior to

Tagged with: , , , , , , , , , ,
Posted in Blog

How To Beat Ransomware But Not Your Budget

The solution to ransomware is real-time data protection. The moment data changes it needs to be copied to a secondary storage system and sequestered from primary storage. Then, if a ransomware virus attacks, the last known good copy can be

Tagged with: , , , , , , ,
Posted in Blog

How Next-gen HSM Solutions Complement Backup

Organizations need to backup their data, but if you view backup as a one-size-fits-all job, where all data is treated equally, you’re missing an opportunity for substantial cost savings. Ideally, you could tier storage and create an “active archive” that

Tagged with: , , , , , , ,
Posted in Blog

Why is Encryption Key Ownership So Important?

When it comes to encryption, IT is constantly being told to “own the keys.” But why? Isn’t it OK if your provider owns the keys? Encryption keys are how you unlock encrypted data. Whoever or whatever owns the keys has

Tagged with: , , , , ,
Posted in Blog