Blog Archives

Designing Backups for Data Privacy and Ransomware

Two external factors are forcing organizations to rethink their backup process and how they store backup data. The first is the ever-increasing threat of ransomware, which encrypts production data forcing the customer to pay for a “key” to decrypt it.

Tagged with: , , , , , , , , , , ,
Posted in Blog

Webinar: Application Explosion – Rediscovering the Lost Art of Protection Service Levels

The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the

Tagged with: , , , , , , , , , ,
Posted in Webinar

Webinar – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Webinar

Backup Endpoints So You Can Wipe Them

One of the best reasons to backup endpoints like laptops, tablets and smartphones has nothing to do with restores, it has to do with deletion. Endpoints are the most vulnerable to theft. They are left in airport security lines, Starbucks

Tagged with: , , , , , , ,
Posted in Blog

How to Go All-In with the Cloud as Primary Storage

In our on demand webinar, “Eliminate Backups and Simplify DR with Hybrid Cloud Storage“, we discuss how IT can use the cloud as primary storage to improve their data protection process while dramatically reducing their investments in secondary storage. Since

Tagged with: , , , , , , , , ,
Posted in Blog

SlideShare: Using the Cloud to Fix Backup’s Blind Spot – Endpoint Data Protection

Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on

Tagged with: , , , , , , ,
Posted in Slideshare

The Dirty Little Secret about DRaaS

Disaster Recovery as a Service (DRaaS) is a game changer for many, cloud backup as a service providers. The service enables organizations to stand up instances of their mission critical applications in the provider’s cloud instead of recovering them across

Tagged with: , , , , , , , , ,
Posted in Blog

Object Storage or Cloud for Enterprise File Sync and Share

Enterprise File Sync and Share (EFSS) is a “must deliver” for IT since most users perceive the capability to be a “must have”. In our last blog we discussed what to look for in an EFSS and explained the advantages

Tagged with: , , , , , , , , , , ,
Posted in Blog

Modern Data Protection Architectures Enable a Step-by-Step Cloud Journey

The cloud holds much promise for data protection, but support for the cloud varies depending on the solution. Traditional backup applications and appliances have, at best, rudimentary support for the cloud. They may only mirror the on-premises copy of data

Tagged with: , , , , , , , , , ,
Posted in Blog

SlideShare: Eliminate Backups and Simplify DR with Hybrid Cloud Storage

The cloud should be a valuable ally in helping organizations eliminate backup infrastructure and increase their disaster recovery (DR) confidence. The reality is that current cloud backup and DR solutions fall short because they don’t fully exploit cloud resources. Most

Tagged with: , , , , , ,
Posted in Slideshare