Blog Archives

Can Your Server Survive a Fire or Flood? – ioSafe Briefing Note

My dad always said, “The best fight is one you don’t have.” In the same way, the best restore is one you never have to do. We all believe that, and we do our best to avoid every restore we

Tagged with: , , , , , , , , , ,
Posted in Blog

How IT can Leverage its Own Big Data for Operational Efficiency

OpsDataStore Briefing Note One of the most practical use cases of big data analytics is the analysis of data that the organization is already generating, typically in the form of log file examination, which yields impressive results (most notably in

Tagged with: , , , , , , ,
Posted in Blog

Can DRaaS Protect you from Ransomware?

Disaster recovery as a service (DRaaS) vendors suggest their offerings can cure a number of ails. They offer the power and recoverability of a hot site without the traditional costs that a hot site present. They offer a way to

Tagged with: , , , , , , ,
Posted in Blog

Can You “Future Proof” Data Protection?

The data protection process always seems like it is playing catch up to the recovery expectations of production data. Part of the problem is that data protection is often considered after an application has rolled-out in production. The other part

Tagged with: , , , , , , , , ,
Posted in Blog

Does Recovery and Performance Have to be a Compromise?

The ability to quickly resume operations after a severe disaster is critical for organizations of all sizes. Fortunately, disasters don’t occur every day, in fact they are actually pretty rare. It is their severity that makes organizations plan for them.

Tagged with: , , , , , , , ,
Posted in Blog

On Demand Webinar: How to “Future Proof” Data Protection for Organizational Resilience

Users expectations of IT’s ability to return mission critical applications to production are higher than ever. These expectations are leading IT to abandon many of their backup and recovery solutions to try new, unproven solutions that may or may not

Tagged with: , , , , , , , , ,
Posted in Webinar

How Do You Protect An All-Flash Array?

Technically, an organization can protect a new all-flash array the same way it protects its current hard drive based array – use backup software to access the hypervisor, have it trigger a snapshot and then backup all the blocks that

Tagged with: , , , , , , , , ,
Posted in Blog

Enterprise Backup vs Point Backup

For two decades IT has had two choices when selecting a data protection solution. They can choose a holistic solution that covers the majority of the applications, operating systems and data protection goals or they can select a point data

Tagged with: , , , , , , , , , ,
Posted in Blog

How to Deliver Files Anywhere and Security Everywhere

Users seem to be everywhere and they can carry their compute in multiple forms (laptop, tablet, smartphone) at all times. They also want to have their files, the subset corporate data they work on, with them at all times. Also,

Tagged with: , , , , , , , ,
Posted in Blog

Successful Disaster Recovery? – Trust but Verify

Verifying that you’re ready for a disaster is difficult but not impossible. The three elements of your infrastructure that must be present for a successful recovery from a disaster are compute, network, and storage. Let’s take a look at how

Tagged with: , , , , , , , ,
Posted in Blog