Blog Archives

Is Mutual Mystification Part of your Disaster Recovery Plan?

It is impossible for all applications to be recovered instantly with no data loss after a disaster. But that is exactly what users expect. We find in some organizations IT avoids having the necessary conversation that brings users and application

Tagged with: , , , , , , , , , , ,
Posted in Blog

Do You Understand Your Disaster Recovery Buckets?

Disaster Recovery is a complex and fragile process. That is why it is important for IT to simplify that process as much as possible. An area where we are seeing success is how you group applications. While each application will

Tagged with: , , , , , , , , ,
Posted in Blog

ChalkTalk Video: When Should You Use High Availability instead of Backup?

Most data centers have some sort of backup strategy where it copies data on a periodic basis, typically once per night, to a secondary storage device and then either replicated or transported to a disaster recovery site. They count on

Tagged with: , , , , , , , , , , ,
Posted in Video

What is a Consistency Group?

Understanding consistency groups is essential to having a properly functioning disaster recovery process. They speak to the reality that it is not possible to recover everything at the same time. Creating recovery groups makes a recovery from a disaster much

Tagged with: , , , , , ,
Posted in Blog

Can You Eliminate Downtime? – New White Paper

Achieving a zero or near-zero recovery point and recovery time objective requires planning. From a data perspective, IT needs to position the data in a ready state on the recovery system. The positioning or copying of data needs to happen either as,

Tagged with: , , , , , , , , , ,
Posted in Blog

Can You “Future Proof” Data Protection?

The data protection process always seems like it is playing catch up to the recovery expectations of production data. Part of the problem is that data protection is often considered after an application has rolled-out in production. The other part

Tagged with: , , , , , , , , ,
Posted in Blog

On Demand Webinar: How to “Future Proof” Data Protection for Organizational Resilience

Users expectations of IT’s ability to return mission critical applications to production are higher than ever. These expectations are leading IT to abandon many of their backup and recovery solutions to try new, unproven solutions that may or may not

Tagged with: , , , , , , , , ,
Posted in Webinar