The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the…
The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the…
IT is facing new challenges in managing unstructured data. Organizations want to store more unstructured data and keep it longer for future analysis. However, the protection and retention methods of traditional backup and archive solutions are not keeping pace with…
Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they…
Achieving the Benefits of Open Networking in the Data Center Open networking offers the ability to break free of vendor lock-in and achieve white box economics. SDN promises automation, reduced OpEx and increased agility. However, the open networking and SDN landscape can…
Copy Data Management promises to not only improve the data protection process, it promises to provide value to the organization even without a looming disaster. It can reduce storage costs by presenting virtual copies of data to test/dev, analytics and…
The General Data Protection Regulation (GDPR) makes specific demands on organizations based in and doing business in the European Union (EU). Now several US states are considering similar legislation and California has already passed a GDPR-like law. Clearly this is…
What comes after Data Center Modernization? The future data center is smart. But what is a smart data center, how do you create a smart data center and why would you want to? We answer all of these questions on…
Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on…
Organizations have tried a variety of solutions to regain control of their data storage infrastructure. They’ve invested in monolithic storage systems, software defined storage (SDS) and hyper-converged systems. While each approach may have brought some value, each failed in its…
