Blog Archives

Webinar: Overcoming the Storage Roadblock to Data Center Modernization

Organizations have tried a variety of solutions to regain control of their data storage infrastructure. They’ve invested in monolithic storage systems, software defined storage (SDS) and hyper-converged systems. While each approach may have brought some value, each failed in its

Tagged with: , , , , , , ,
Posted in Webinar

Demo: Disaster Recovery as a Service in Action

By leveraging the cloud, Disaster Recovery as a Service (DRaaS) eliminates many of the costs associated with a DR site, changing it from a capital cost to an operational cost. Does DRaaS sound too good to be true? Can organizations

Tagged with: , , , , , , , ,
Posted in Webinar

SlideShare: The Three Reasons Cloud Backup is Broken and How to Fix It

The cloud was supposed to be the answer to IT’s backup dilemma; instead, it in some ways has made the situation worse. In this on demand webinar Storage Switzerland and Microsoft Azure have a roundtable discussion on what’s gone wrong

Tagged with: , , , , , , ,
Posted in Slideshare

The Math Behind Storage Architecture Design

The speed at which the data center is evolving is forcing IT to sacrifice proper storage architecture design. IT is just trying to keep its head above water; it doesn’t have time to swim. This reality leads to a primary

Tagged with: , , , , , , , , , ,
Posted in Blog

Cyber-Secure Storage Requires More Than Encryption

Encryption is a fundamental element of building a secure storage system, but organizations need more than just encryption. Encryption works when the outside attacker can’t authenticate themselves, but if the outside attacker can compromise a user or admin account, then

Tagged with: , , , , , , ,
Posted in Blog

Do You Need to Protect Cloud-Native Applications?

One of the forgotten elements of migrating an application to the cloud is protecting that application and its data. There sometimes is an assumption that the cloud automatically protects itself and for natural disaster protection, that assumption is correct. Most

Tagged with: , , , , , , , , ,
Posted in Blog

White Paper: What if the Cloud Backed itself Up?

Hybrid IT is the standard by which most organizations operate. Protecting both on-premises and cloud-based data sets is more critical than ever. The problem is that protecting these environments require separate software applications. The process for protecting cloud-native applications is

Tagged with: , , , , , , ,
Posted in White Paper

Should You Protect Unstructured Data Differently?

The focus of backup is now on unstructured data instead of databases. Indeed, protection of databases is as important as it ever has been, but the backup process is probably not the right way to protect that data. Organizations have

Tagged with: , , , , , , ,
Posted in Blog

Why Do Ransomware Victims Pay?

If ransomware gets through an organization’s defenses, they have two choices. Recover or pay. Given the growth in the number of ransomware attacks, many organizations choose to pay, which only further fuels the industry making the next round of ransomware

Tagged with: , , , , , , ,
Posted in Blog

Three Steps to Moving Legacy Backups to the Cloud

One of the significant challenges regarding data protection is managing its data set. Secondary storage tiers store five to ten times as much data as production data stores and can overwhelm the data center. IT planners are looking to cloud

Tagged with: , , , , , , , , ,
Posted in Blog