Blog Archives

Why Not Build Ransomware Proof Storage?

The best way to protect an organization from a ransomware attack is at its source, primary storage. Ransomware works by compromising a user account and then encrypting all the files that the account can access. A compromised superuser account is

Tagged with: , , , , , , , ,
Posted in Blog

Should Backup Software Companies Build an Appliance?

A little over 15 years ago we started to see the creation of the backup appliance market with the creation of the deduplication backup target appliance. Since that time, we’ve gone from having no backup appliances to having so many

Tagged with: , , , , , , , , ,
Posted in Article

Should Experts Convince You to Pay for Ransomware?

I may be an analyst for Storage Swiss now, but for 30 years I’ve also been in the news business. So with the emergence of “WannaCry” I’m seeing my two worlds collide. And it’s no surprise it’s over ransomware. We’ve

Tagged with: , , , , , ,
Posted in Blog

How Do You Stop WannaCry?

Preventing the WannaCry attack is simple. Update Windows. Stopping the next ransomware attack may take more prevention steps. WannaCry leverages exploits that were made public when hackers revealed on April 14 a list of exploits that were allegedly developed by

Tagged with: , , , , ,
Posted in Blog

How Do Disk Backup Appliances Scale?

Eventually most organizations will run out of backup storage, so understanding how backup storage scales is critical to creating a long term data protection strategy. It is not as simple as just converting to a scale-out architecture because deduplication adds

Tagged with: , , , , ,
Posted in Blog

Ransomware – How To Create a Proactive Protection File Strategy

IT needs a proactive way to stop ransomware. It’s here to stay. Most ransomware countermeasures are reactive. The damage is done before IT can deploy their reactive countermeasures. When ransomware gets through an organization’s defenses, it starts to encrypt data,

Tagged with: , , , , , , ,
Posted in Article

Webinar: 15 Minute Ransomware Survival Guide

Ransomware is a new threat, and new threats require new strategies. Within the first 15 minutes this webinar will provide you key strategies for surviving a ransomware attack. During the event Storage Switzerland and Commvault cover the three P’s of

Tagged with: , , , , ,
Posted in Webinar

What Storage Product Should You Use in the Cisco UCS Storage Server?

Customers of Cisco’s UCS 3260 Storage Server can run any software defined storage product that is available as a software-only product. The question is how does one pick amongst the many that are available? Understanding the performance and functionality needs

Tagged with: , , , , , , , , , , , ,
Posted in Article

How To Beat Ransomware But Not Your Budget

The solution to ransomware is real-time data protection. The moment data changes it needs to be copied to a secondary storage system and sequestered from primary storage. Then, if a ransomware virus attacks, the last known good copy can be

Tagged with: , , , , , , ,
Posted in Blog