Blog Archives

Live Webinar: Understanding the 5 Most Common Oversights in a DRaaS Strategy

Disaster Recovery as a Service (DRaaS) is potentially one of the best use cases for cloud resources. DR sites owned by the organization are expensive to set up and maintain as well as challenging to get to when a disaster

Tagged with: , , , , , , , , , ,
Posted in Webinar

Keeping Office 365 Data Safe with Veeam and KeepItSafe

Beyond Microsoft’s clear position on data, “it’s your data”, it makes more sense to protect Microsoft Office 365 than potentially any other SaaS platform. Office 365 has on-premises versions, so when IT recovers data on-premises the organization can actually operate

Tagged with: , , , , , , , , , ,
Posted in Article

The Problem with Gold-Only Data Protection Service Levels

A recent Storage Switzerland webinar dealt with the impact of the massive increase in the number of applications that data centers support on the data protection architecture. How does IT apply the right level of protection, set service levels, for

Tagged with: , , , , , , , , , ,
Posted in Blog

How to Backup Office 365

The case for protecting Office 365 is undeniable. First, Microsoft’s license agreement makes it very clear that the data stored on its service is the user’s and it is the user’s responsibility to protect it. Second, it makes sense to

Tagged with: , , , , , , , ,
Posted in Article

SlideShare: Application Explosion – Rediscovering the Lost Art of Protection Service Levels

The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the

Tagged with: , , , , , , , , , ,
Posted in Slideshare

Embracing Cloud Storage Services for Data Durability and Availability

Legacy storage architectures are notoriously expensive and complex. Factor in the blazing pace at which data growth is accelerating, alongside rising pressure from the business for ubiquitous and always-on data availability, and a new nightmare is brewing for IT –

Tagged with: , , , , , , , , ,
Posted in Blog

Have We Reached VMware Backup Parity?

There was a time not too long ago where the state of VMware backups was bad. It was so bad in fact that entirely new companies emerged to address the problem. These companies took the approach of ignoring the then

Tagged with: , , , , , , , , , ,
Posted in Blog

SlideShare – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Slideshare

Bored with Ransomware? Good it is Not the Primary Problem

There has been a lot, too much maybe, discussion about ransomware and its impact on business. Ransomware is a threat but it is only one of the reasons organizations should protect user endpoints and servers. In a recent Storage Switzerland

Tagged with: , , , , , , , , ,
Posted in Blog

Object Storage Vs. The Public Cloud – Friend or Foe

In today’s webinar, “2019 Storage Strategies Series – What’s Your Plan for Object Storage?” one of the key points of discussion will be about the cloud. Most cloud providers have a tier of storage built from object storage so is

Tagged with: , , , , , , , , , , ,
Posted in Blog