Blog Archives

How Next-gen HSM Solutions Complement Backup

Organizations need to backup their data, but if you view backup as a one-size-fits-all job, where all data is treated equally, you’re missing an opportunity for substantial cost savings. Ideally, you could tier storage and create an “active archive” that

Tagged with: , , , , , , ,
Posted in Blog

Why Backups Can’t Protect Against Ransomware

Ransomware is a new type of threat. As a result it needs a new type of defense. The reason is simple: Backups are not enough to protect against ransomware. They are increasingly victims of the attack themselves, and they don’t

Tagged with: , , , , , , ,
Posted in Blog

How Do You End Ransomware?

Here we go again. Friday, a ransomware attack hit the England’s National Health Care System. And according to sources they are paying! Once again we are rewarding bad behavior. The only way to end ransomware is to dry up its

Tagged with: , , , ,
Posted in Blog

Why Would a Service Provider Want Object Storage?

Object storage was built for the cloud; therefore, any company considering providing storage services for other companies will find object storage the best fit for that application. Other shared storage systems, such as NAS filers, simply do not compare when

Tagged with: , , , , ,
Posted in Blog

Why Not Have your Backup System Provide CDM? – Unitrends Briefing Note

If the updates coming out of the various backup software companies are any indication, copy data management (CDM) and instant recovery are mainstream features. In addition, some backup software products are finally starting to recognize the importance of creating and

Tagged with: , , , , , , , , ,
Posted in Briefing Note

How To Solve The Three Biggest HCI Adoption Challenges

Guaranteeing application performance, creating a cloud like consumption model and timing the simultaneous replacement of three data center architectures are the biggest hindrances to HCI adoption. Hyperconverged infrastructures (HCI) promise to simplify a data center, making it more cloud like.

Tagged with: , , , , , , , , ,
Posted in Blog

Best Next Steps for the Hybrid Cloud

Companies that are deciding to leverage a hybrid cloud infrastructure have a number of options available to them that others do not. But since the concept of hybrid cloud is still so new, it’s not always obvious what the choices

Tagged with: , , , , , , , ,
Posted in Blog

What is Ransomware?

Ransomware is one of the biggest threats facing IT. What exactly is ransomware? Ransomware is a program that once installed in a system encrypts an organization’s data and the only way to get it unencrypted is to pay a fee

Tagged with: , , , , , , , ,
Posted in Blog