Blog Archives

Embracing Cloud Storage Services for Data Durability and Availability

Legacy storage architectures are notoriously expensive and complex. Factor in the blazing pace at which data growth is accelerating, alongside rising pressure from the business for ubiquitous and always-on data availability, and a new nightmare is brewing for IT –

Tagged with: , , , , , , , , ,
Posted in Blog

Does Your All-Flash Array Support Hard Disk Drives?

Technically, if an All-Flash Array (AFA) supports hard disk drives, it is no longer an AFA. What if however, the system could start as an AFA and then later, to save costs, move older data to inexpensive, high capacity hard

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

The State of Enterprise Cloud Storage

Cloud storage is typically known for its seemingly infinite capacity and low upfront costs. It also is operationally more economical since the organization does not need to house all the gear in its data center. The outsourcing of the hardware

Tagged with: , , , , , , , , , ,
Posted in Article

StorageSwiss Podcast – Talking GDPR and CCPA with Aparavi

Join Storage Switzerland and Aparavi for our PodCast dealing with data privacy regulations like the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA). The regulations potentially force organizations of all sizes to rethink how they

Tagged with: , , , , , , ,
Posted in Podcast

Have We Reached VMware Backup Parity?

There was a time not too long ago where the state of VMware backups was bad. It was so bad in fact that entirely new companies emerged to address the problem. These companies took the approach of ignoring the then

Tagged with: , , , , , , , , , ,
Posted in Blog

SlideShare: Dealing with the Elephant in the Datacenter – How to Protect, Manage, and Leverage Unstructured Data

IT is facing new challenges in managing unstructured data. Organizations want to store more unstructured data and keep it longer for future analysis. However, the protection and retention methods of traditional backup and archive solutions are not keeping pace with

Tagged with: , , , , , , , , ,
Posted in Slideshare

SlideShare – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Slideshare

SlideShare: The Software Matters in Open Networking

Achieving the Benefits of Open Networking in the Data Center Open networking offers the ability to break free of vendor lock-in and achieve white box economics. SDN promises automation, reduced OpEx and increased agility. However, the open networking and SDN landscape can

Tagged with: , , , , , , , ,
Posted in Slideshare

Bored with Ransomware? Good it is Not the Primary Problem

There has been a lot, too much maybe, discussion about ransomware and its impact on business. Ransomware is a threat but it is only one of the reasons organizations should protect user endpoints and servers. In a recent Storage Switzerland

Tagged with: , , , , , , , , ,
Posted in Blog

Does Your All-Flash Software Provide Data Protection?

Most primary storage systems and software provide some form of data protection. That protection comes in the form of protection from media failure (typically RAID), snapshots and clones. All-Flash Arrays (AFA) seem to provide a better than average level of

Tagged with: , , , , , , , , , , ,
Posted in Blog