Blog Archives

Why Not Build Ransomware Proof Storage?

The best way to protect an organization from a ransomware attack is at its source, primary storage. Ransomware works by compromising a user account and then encrypting all the files that the account can access. A compromised superuser account is

Tagged with: , , , , , , , ,
Posted in Blog

Should Backup Software Companies Build an Appliance?

A little over 15 years ago we started to see the creation of the backup appliance market with the creation of the deduplication backup target appliance. Since that time, we’ve gone from having no backup appliances to having so many

Tagged with: , , , , , , , , ,
Posted in Article

Should Experts Convince You to Pay for Ransomware?

I may be an analyst for Storage Swiss now, but for 30 years I’ve also been in the news business. So with the emergence of “WannaCry” I’m seeing my two worlds collide. And it’s no surprise it’s over ransomware. We’ve

Tagged with: , , , , , ,
Posted in Blog

How Do You Stop WannaCry?

Preventing the WannaCry attack is simple. Update Windows. Stopping the next ransomware attack may take more prevention steps. WannaCry leverages exploits that were made public when hackers revealed on April 14 a list of exploits that were allegedly developed by

Tagged with: , , , , ,
Posted in Blog

How Do Disk Backup Appliances Scale?

Eventually most organizations will run out of backup storage, so understanding how backup storage scales is critical to creating a long term data protection strategy. It is not as simple as just converting to a scale-out architecture because deduplication adds

Tagged with: , , , , ,
Posted in Blog

Ransomware – How To Create a Proactive Protection File Strategy

IT needs a proactive way to stop ransomware. It’s here to stay. Most ransomware countermeasures are reactive. The damage is done before IT can deploy their reactive countermeasures. When ransomware gets through an organization’s defenses, it starts to encrypt data,

Tagged with: , , , , , , ,
Posted in Article

Live Webinar: 15 Minute Ransomware Survival Guide

Ransomware is a new threat, and new threats require new strategies. Within the first 15 minutes this webinar will provide you key strategies for surviving a ransomware attack. During the event Storage Switzerland and Commvault will cover the three P’s

Tagged with: , , , , ,
Posted in Webinar