Blog Archives

The Evolution of Ransomware – Is Backup Safe?

When ransomware first appeared in data centers, it had a simple attack pattern. Once it landed inside the data center, the malware tried to encrypt every file as fast as possible. If IT didn’t have good backups, the organization was

Tagged with: , , , , , , , ,
Posted in Blog

Building a Better Backup Appliance – iXsystems Briefing Note

When it comes to storing backup data, IT professionals have a lot of options from which to choose. Dedicated backup appliances tend to be the most popular selection. Another option is using the backup software’s built-in storage capabilities and building

Tagged with: , , , , , , , ,
Posted in Briefing Note

ChalkTalk Video: Ransomware Attacks Backups

Is 3-2-1 for Backup Enough to Protect Against Ransomware? Because many organizations continue to pay ransoms to unlock their data, ransomware continues to become more sophisticated. The malware now attacks backup applications themselves and is infiltrating backup data. In this

Tagged with: , , , , , , , , ,
Posted in Video

What are Ransomware Attack Loops and How to Prevent Them – Asigra Briefing Note

Ransomware is the “new” disaster with which every data center, regardless of location, needs to be concerned. IT must take steps to protect the organization’s data, and even its brand from ransomware. A successful defense against ransomware requires user training

Tagged with: , , , , , , , ,
Posted in Briefing Note

Asigra is Backing up Docker Containers

The first commercial solution designed for backing up containers is here. So the first question is: do you need to back up containers? The answer is really up to you. Whether or not they need backup depends on how you

Tagged with: , , , , , ,
Posted in Blog

Easing Amazon EBS Snapshot Pain, for Free

It’s a major pain to manage snapshots in Amazon Web Services Elastic Block Storage (AWS EBS). It’s essentially a single command line with very limited capabilities. The result is that developers writing applications for AWS find themselves building tools to

Tagged with: , , , ,
Posted in Blog

Future Proofing the Storage Reseller

Storage resellers are in a precarious situation. They have to differentiate not only themselves from other storage resellers theyat have to differentiate themselves from storage manufacturers that are often tempted to have a direct relationship with the reseller’s customers. On

Tagged with: , , , , , ,
Posted in Blog