Blog Archives

Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?

Believe it or not, it has been a year since WannaCry crippled organizations around the world, and since that time ransomware attacks have only accelerated. The ransomware “industry” is now a $5 billion market and is projected to grow to

Tagged with: , , , , , , ,
Posted in Webinar

SlideShare: The Three New Requirements of Unstructured Data Protection – Can your backup deliver?

Because of the ability to mine it for information, unstructured data is becoming the most valuable data asset that many organizations have. The more unstructured data an organization has, the greater its value to the organization becomes. The growth in

Tagged with: , , , ,
Posted in Slideshare

Developing a Practical Cloud Strategy for Traditional Data Centers

Many organizations want to develop a cloud strategy, but most don’t know where to begin. As a result, the organization stumbles into the cloud, often starting with using the cloud as a secondary backup storage area, with the hope that

Tagged with: , , , , , , , , , ,
Posted in Article

What is Tape as a Service?

Tape should be a critical component of every data center. As a medium, it is cost effective and easy to transport. It also provides diversity as an offline alternative media choice to hard disk based technology. The problem is that

Tagged with: , , , , , , , , , ,
Posted in Blog

White Paper: How to Reduce Secondary Storage Infrastructure Size and Cost

Secondary storage does more than just store backups. It also serves as storage for archive data, IoT data and support copy data use cases like test development and reporting. As a result, the infrastructure requirements for secondary data have grown

Tagged with: , , , , , , ,
Posted in White Paper

How to Turn Email into Knowledge – MailJive Briefing Note

In the digital age, organizations have countless ways in which they can communicate, but email remains the most popular. Email though is used for far more than just communication. The organization, rightly or wrongly, uses it to store documents, contact

Tagged with: , , , , , , ,
Posted in Briefing Note

What Type of Cloud Provider Do You Need?

IT’s impression of the cloud has evolved over the past few years. Most IT professionals see the cloud not as a competitor but as another tool in the IT toolbox. Like any other tool, when used in the right circumstances

Tagged with: , , , , , ,
Posted in Blog

SlideShare: Three Reasons Why Object Storage is the Best Defense against Ransomware Attacks

Backups, by themselves, are not an effective defense against a ransomware attack. The systems that store backup data also require protection, but backup storage is as vulnerable to a ransomware attack as production data, if not more so. If both

Tagged with: , , , , , , , ,
Posted in Slideshare

Unstructured Data Has Changed – Has Your Protection Strategy?

Unstructured data is easily the largest data set in the enterprise today and what makes up that data set has changed dramatically over the past ten years. What used to be relatively few and small files created by users are

Tagged with: , , , ,
Posted in Blog