Blog Archives

How to Design a Modern Data Protection Architecture

Data Protection is changing. Today backup software can recover in-place, instantiating volumes directly on the backup storage which enables organizations to significantly reduce recovery windows. Consequently, the performance of the backup storage hardware matters more than ever. At the same

Tagged with: , , , , , , , , ,
Posted in Article

MeetTheCEO: Cloud Daddy’s Spencer Kupferman

As businesses migrate more of their data and applications to the cloud, a more comprehensive and mature disaster recovery implementation is required. Cloud service providers have built a base layer of data protection capabilities that focus primarily on enabling recovery

Tagged with: , , , , , , , , , ,
Posted in Webinar

MeetTheCEO: HotLink’s Lynn LeBlanc

Backups cannot be assumed to be safe today, against an emergence of more sophisticated malware. These new variants were designed to be discrete, often sitting idle and being copied across the backup repository to then attack slowly – all with

Tagged with: , , , , , , ,
Posted in Webinar

How to Make One Thousand Snapshots Useful

Almost every modern storage system claims to support “thousands” of snapshots of production data without impacting performance. While some of the lack of performance impact claims have proven to be suspect, there is little doubt that today’s storage solutions support

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Worried About Meeting Disaster Recovery SLAs? Consider These Capabilities

Data protection infrastructures face tremendous pressure. Copy data is growing even faster than production data as businesses create copies to support analytics, test and development, and other important initiatives. Copy data also needs to be retained for longer periods of

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

How to Modernize the Data Protection Architecture

Modernization of various components and processes within the data center is a popular topic with IT professionals. One area of concentration is the data protection architecture. Advances in both software and hardware promise to dramatically reduce recovery times while at

Tagged with: , , , , , , , , , ,
Posted in White Paper

You Will be Breached – What’s Next for Recoverability?

As ransomware variants grow in number and sophistication, it is practically inevitable that enterprises will be breached. Users are becoming more aware, but eventually there will be some users in the enterprise that click on something they shouldn’t. At the

Tagged with: , , , , , , , , , ,
Posted in Blog

Cloud Endpoint Protection: Potential Pitfalls to Avoid

Backing up endpoint data is no longer a nice-to-have. Leaving endpoints unprotected leaves critical enterprise data vulnerable to malware, deletion, theft or corruption, and to running afoul of data privacy regulations. This can quickly result in a tarnished brand reputation,

Tagged with: , , , , , , , , , ,
Posted in Blog

Tired of Backup Storage Capacity Planning? Look to the Cloud

As recently discussed by Stephen Aldous, Principal Product Manager for Carbonite, and George Crump, Storage Switzerland’s Lead Analyst, backup purchases are difficult to budget for and are often an afterthought. Additionally, backup infrastructure typically jumps from periods of underutilization, to

Tagged with: , , , , , , , , , , ,
Posted in Blog