Blog Archives

Endpoints – From Laptop Backup to Total Data Management

Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical

Tagged with: , , , , , , , , , , , , ,
Posted in Article

What is the Data Governance Gap?

In the past most data related regulations focused on data protection and disaster recovery. The European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA), as well as other soon-to-come regulations, continue to have data protection and

Tagged with: , , , , , , , , , , ,
Posted in Blog

SlideShare: Application Explosion – Rediscovering the Lost Art of Protection Service Levels

The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the

Tagged with: , , , , , , , , , ,
Posted in Slideshare

Embracing Cloud Storage Services for Data Durability and Availability

Legacy storage architectures are notoriously expensive and complex. Factor in the blazing pace at which data growth is accelerating, alongside rising pressure from the business for ubiquitous and always-on data availability, and a new nightmare is brewing for IT –

Tagged with: , , , , , , , , ,
Posted in Blog

Does Your All-Flash Array Support Hard Disk Drives?

Technically, if an All-Flash Array (AFA) supports hard disk drives, it is no longer an AFA. What if however, the system could start as an AFA and then later, to save costs, move older data to inexpensive, high capacity hard

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

The State of Enterprise Cloud Storage

Cloud storage is typically known for its seemingly infinite capacity and low upfront costs. It also is operationally more economical since the organization does not need to house all the gear in its data center. The outsourcing of the hardware

Tagged with: , , , , , , , , , ,
Posted in Article

StorageSwiss Podcast – Talking GDPR and CCPA with Aparavi

Join Storage Switzerland and Aparavi for our PodCast dealing with data privacy regulations like the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA). The regulations potentially force organizations of all sizes to rethink how they

Tagged with: , , , , , , ,
Posted in Podcast

Have We Reached VMware Backup Parity?

There was a time not too long ago where the state of VMware backups was bad. It was so bad in fact that entirely new companies emerged to address the problem. These companies took the approach of ignoring the then

Tagged with: , , , , , , , , , ,
Posted in Blog

SlideShare: Dealing with the Elephant in the Datacenter – How to Protect, Manage, and Leverage Unstructured Data

IT is facing new challenges in managing unstructured data. Organizations want to store more unstructured data and keep it longer for future analysis. However, the protection and retention methods of traditional backup and archive solutions are not keeping pace with

Tagged with: , , , , , , , , ,
Posted in Slideshare

SlideShare – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Slideshare