Blog Archives

SlideShare: Three Reasons Why Object Storage is the Best Defense against Ransomware Attacks

Backups, by themselves, are not an effective defense against a ransomware attack. The systems that store backup data also require protection, but backup storage is as vulnerable to a ransomware attack as production data, if not more so. If both

Tagged with: , , , , , , , ,
Posted in Slideshare

Unstructured Data Has Changed – Has Your Protection Strategy?

Unstructured data is easily the largest data set in the enterprise today and what makes up that data set has changed dramatically over the past ten years. What used to be relatively few and small files created by users are

Tagged with: , , , ,
Posted in Blog

Managing Data to Manage Ransomware

One of the reasons that data centers are so vulnerable to ransomware attacks is the amount of data that remains accessible on production storage. The reality is that most of this data does not need to be there. Investing in

Tagged with: , , , , , , , ,
Posted in Blog

Live Webinar: The Three New Requirements of Unstructured Data Protection – Can your backup deliver?

Because of the ability to mine it for information, unstructured data is becoming the most valuable data asset that many organizations have. The more unstructured data an organization has, the greater its value to the organization becomes. The growth in

Tagged with: , , , ,
Posted in Webinar

SlideShare: 3 Steps to Controlling the Secondary Storage Deluge

Primary storage is no longer the most expensive tier of storage. Secondary storage, storage that stores copies, backups and archives, is now far more expensive than primary storage. The growth of this tier threatens to bury the data center under

Tagged with: , , , , , ,
Posted in Slideshare

Webinar: Three Reasons Why Object Storage is the Best Defense against Ransomware Attacks

Backups, by themselves, are not an effective defense against a ransomware attack. The systems that store backup data also require protection, but backup storage is as vulnerable to a ransomware attack as production data, if not more so. If both

Tagged with: , , , , , , , ,
Posted in Webinar

Meeting the Five Unstructured Data Backup Requirements

In the last blog, we laid out the five requirements for unstructured data protection; fine-grained backups, frequent and rapid backups; cloud support, data classification, and an archiving future. Aparavi is one of the first data protection companies specifically focused on

Tagged with: , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,860 other followers

Blog Stats
  • 1,166,936 views