A recent Storage Switzerland webinar dealt with the impact of the massive increase in the number of applications that data centers support on the data protection architecture. How does IT apply the right level of protection, set service levels, for…
A recent Storage Switzerland webinar dealt with the impact of the massive increase in the number of applications that data centers support on the data protection architecture. How does IT apply the right level of protection, set service levels, for…
Join Storage Switzerland and SolarWinds for our Friday Flash webinar. In 15 minutes our panel of experts provide you the information you need so you can better deal with storage sprawl in your data center. Storage Switzerland finds that most…
Organizations need to make copies of data for a lot of excellent reasons, and it’s better to make a copy than to impact production performance. The challenge is managing those copies. Organizations without proper control over copy data find that…
Applying data center data management best practices to endpoints is particularly challenging. As discussed in our prior post, there is the physical challenge that most organizations have hundreds if not thousands of endpoints and those endpoints are mobile. Managing and…
The case for protecting Office 365 is undeniable. First, Microsoft’s license agreement makes it very clear that the data stored on its service is the user’s and it is the user’s responsibility to protect it. Second, it makes sense to…
Backup makes a copy of primary data on a secondary storage tier. It then tries to isolate that copy so that it can’t be changed either from external forces like ransomware or internal influences like users. For the most part…
Organizations are now drowning in unstructured data. Addressing the growth and managing this data is increasingly a high priority for organizations. The public cloud has a role to play and vendors must carefully integrate it into their unstructured data protection…
Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical…
In the past most data related regulations focused on data protection and disaster recovery. The European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA), as well as other soon-to-come regulations, continue to have data protection and…