Blog Archives

Moving on From Mozy Endpoint

Protecting laptops, tablets, and smartphones (endpoints) are more critical than ever. Users use endpoints of all types to create data essential to the organization, but the user may never store that data on a corporate (and protected) fileserver. One of

Tagged with: , , , , , , , , , , , , , ,
Posted in Article

The Requirements of a Modern Data Protection Architecture

Previously, Storage Switzerland wrote about the challenges of trying to meet modern data protection requirements with legacy technologies, including the inability to scale-out and limited cloud integration. We also discussed the pros and cons of new backup appliances and converged

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Why Current Data Protection Architectures Miss the Mark

In response to the increased need for rapid recovery, longer data retention and the desire to support the cloud for vaulting and disaster recovery, alternative solutions are appearing on the market to try and correct the shortcomings of legacy architectures.

Tagged with: , , , , , , , , , ,
Posted in Blog

How to Backup Google Cloud SQL – HYCU Briefing Note

Each of the major cloud providers, Amazon, Google and Azure, provide SQL as a service. While these providers offer data protection, that protection is more for high availability (HA) rather than backup. Most cloud providers leverage replication to protect against

Tagged with: , , , , , , ,
Posted in Briefing Note

Is Your Data Protection Architecture Holding You Back?

In most organizations the data protection architecture has gone unchanged for almost a decade. It’s true that certain components within the architecture change because of technological advances or forced refreshes but the basic design remains the same. The challenge with

Tagged with: , , , , , , , , , , ,
Posted in Blog

SlideShare: Three Steps to Modernizing Backup Storage

Backup software is continuously improving. Solutions like Veeam Backup and Replication deliver instant recoveries, enabling virtual machine volumes to instantiate directly on the backup device, without having to wait for data to transfer back to primary storage. These solutions can

Tagged with: , , , , , , , , ,
Posted in Slideshare

SlideShare: 5 Critical Enterprise Cloud Backup Capabilities

The cloud seems like a logical destination for backup data. It is by definition off-site, and the organization no longer needs to worry about allocating valuable floor space to secondary data storage. The problem is that most cloud backup solutions

Tagged with: , , , , , , , , ,
Posted in Slideshare

Using the Cloud for Backup and Data Protection Modernization

One of the problems created by the modern insights economy and era of strict data privacy regulations is the fact that backup data is growing even faster than production data, and that it also must be retained for longer periods

Tagged with: , , , , , , , , , , ,
Posted in Blog

What is an Endpoint Strategy?

By and large, endpoints (laptops, smartphones, tablets, etc.) are the core vehicle through which employees complete their work every day. These endpoints are also highly susceptible to malware, theft, loss, damage and accidental data deletion – creating a significant business

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

The Changing State of Endpoint Backup

Many organizations consider endpoint backup a “nice-to-have”, in that if endpoint get backed up, at least occasionally it’s considered good enough. Considering how critical endpoints are to today’s workforce and their increasing importance in compliance regulations, IT needs to rethink

Tagged with: , , , , , , , , , , ,
Posted in Blog