Blog Archives

The Problem with Gold-Only Data Protection Service Levels

A recent Storage Switzerland webinar dealt with the impact of the massive increase in the number of applications that data centers support on the data protection architecture. How does IT apply the right level of protection, set service levels, for

Tagged with: , , , , , , , , , ,
Posted in Blog

Friday Flash Webinar: Talking Storage Consolidation vs. Storage Sprawl with SolarWinds

Join Storage Switzerland and SolarWinds for our Friday Flash webinar. In 15 minutes our panel of experts provide you the information you need so you can better deal with storage sprawl in your data center. Storage Switzerland finds that most

Tagged with: , , , , , , , , , ,
Posted in Webinar

StorageShort: Copies Aren’t Bad but Managing Copies Is Critical

Organizations need to make copies of data for a lot of excellent reasons, and it’s better to make a copy than to impact production performance. The challenge is managing those copies. Organizations without proper control over copy data find that

Tagged with: , , , , , , , , ,
Posted in StorageShort

Solving The Challenge with Endpoint Data Strategies

Applying data center data management best practices to endpoints is particularly challenging. As discussed in our prior post, there is the physical challenge that most organizations have hundreds if not thousands of endpoints and those endpoints are mobile. Managing and

Tagged with: , , , , , , , , , , , , ,
Posted in Article

How to Backup Office 365

The case for protecting Office 365 is undeniable. First, Microsoft’s license agreement makes it very clear that the data stored on its service is the user’s and it is the user’s responsibility to protect it. Second, it makes sense to

Tagged with: , , , , , , , ,
Posted in Article

Can Copy Data Management Replace Backup?

Backup makes a copy of primary data on a secondary storage tier. It then tries to isolate that copy so that it can’t be changed either from external forces like ransomware or internal influences like users. For the most part

Tagged with: , , , , , , , , , , ,
Posted in Blog

The Public Cloud’s Role in Unstructured Data Management

Organizations are now drowning in unstructured data. Addressing the growth and managing this data is increasingly a high priority for organizations. The public cloud has a role to play and vendors must carefully integrate it into their unstructured data protection

Tagged with: , , , , , , , , , , ,
Posted in Blog

Endpoints – From Laptop Backup to Total Data Management

Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical

Tagged with: , , , , , , , , , , , , ,
Posted in Article

What is the Data Governance Gap?

In the past most data related regulations focused on data protection and disaster recovery. The European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA), as well as other soon-to-come regulations, continue to have data protection and

Tagged with: , , , , , , , , , , ,
Posted in Blog

SlideShare: Application Explosion – Rediscovering the Lost Art of Protection Service Levels

The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the

Tagged with: , , , , , , , , , ,
Posted in Slideshare