Blog Archives

What’s the Hole in Your Ransomware Protection Strategy?

Over on the Aparavi Blog, Vicki Grey cited a recent study by The Herjavec Group, which indicated that ransomware attacks are on the rise. The report also states that ransomware attacks hit businesses every 14 seconds in 2019, and will

Tagged with: , , , , , , , , ,
Posted in Blog

Surviving the Multiple Data Protection App Reality

Most organizations have more than one backup application, in fact most have three to four and are finding the number of backup applications they need to protect the organizations assets is increasing. At the same time industry and governmental requirements

Tagged with: , , , , , , ,
Posted in Briefing Note

Struggling with Data Privacy? Consider Intelligent Data Management

Regulations have proliferated beyond a concentration in a single industry (such as the financial community) or geographical region (such as Europe). Companies do business globally, and the importance of data is causing new regulations like the California Consumer Privacy Act

Tagged with: , , , , , , , , , , ,
Posted in Blog

What Constitutes a Complete Data Protection Platform?

Endpoint protection has frequently been treated as an expensive hassle that is not worth it. However, for a number of reasons, organizations can no longer risk leaving employees’ laptops, tablets and other devices unprotected. The major concern is that data

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

Meet Application Service Level Agreements (SLAs) Without Breaking Your Storage Budget

Effective application performance management (APM) is fundamental to business success. Businesses are relying on applications for differentiated end customer experiences, smoother internal collaboration, and for innovation. Fundamental to making sure that business critical applications are running smoothly (i.e. they are

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Rethinking Your Data Governance Strategy for Compliance

In today’s era of regulations, the role of archive and long-term retention data is changing dramatically. No longer can data simply be shipped off to a “cheap and deep” repository with the hope that it will never need to be

Tagged with: , , , , , , , , , , ,
Posted in Blog

Key Security Features to Evaluate in Your Cloud Provider

Cloud storage services have evolved significantly in terms of their ability to provide data security, as well as their ability to comply with data privacy regulations such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

How Ransomware and GDPR Break Image Based Backups and How to Fix It

Image based backups, after the initial backup is complete, only backup change blocks within the item they are protecting. The technology enables organizations to frequently backup critical servers and applications. It also enables the protection of file servers with millions

Tagged with: , , , , , , ,
Posted in Briefing Note

Data Management vs Data Protection

Storing data comes with responsibilities, two of which are managing that data and protecting it. Many organizations however, focus most of their attention on protecting the data and almost no attention to managing it. However, focusing attention solely on data

Tagged with: , , , , , , , , , , , ,
Posted in Blog