Blog Archives

Overcoming the Unstructured Data Management Gap

Hardly a week goes by where an IT professional doesn’t hear “storage is growing,” to which they probably roll their eyes and think “no kidding.” What IT needs is more than just appreciation of the problem is a solution to

Tagged with: , , , , , , , , , ,
Posted in Blog

What is Consumption Based Data Protection?

The data protection process has three key costs; the software that protects data; the hardware that drives that software and stores protected copies of data and the administration time required to manage the process. The upfront costs are a challenge

Tagged with: , , , , , , , , ,
Posted in Blog

How the Rights of the Digital Citizen Impacts Storage Infrastructure

In our on demand webinar, “Designing Storage Architectures for Data Privacy, Compliance and Governance” we discuss the impact of regulations like the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) on storage architectures. One of

Tagged with: , , , , , , , , ,
Posted in Blog

Designing a File Storage Infrastructure – CTERA Briefing Note

The combined value of files that an organization creates and stores is higher than its most mission-critical applications. The ability to collaborate, share and retain files both within and outside the organization dictates how competitive that organization is in its

Tagged with: , , , , , ,
Posted in Blog

Orchestration is Key to Cloud Disaster Recovery

The cloud is an ideal location from which to execute a disaster recovery. It eliminates the need for a secondary DR site and the processing power required by recovered applications because the organization purchases cloud storage and compute at the

Tagged with: , , , , , , ,
Posted in Blog

Do You Need to Re-Prioritize Unstructured Data Management Priorities?

In our on demand webinar “The Elephant in the Data Center – Protecting, Managing and Leveraging Unstructured Data”, Storage Switzerland and Igneous discuss the recent 2018 State of Unstructured Data Management report. The report is available as an attachment to

Tagged with: , , , , , , , , ,
Posted in Blog

Can Your Service Levels Keep Up With the Application Explosion?

The method that IT uses to protect applications is changing. Gone are the days of three or four mission critical applications. Today the backup team at most data centers needs to concern itself with protecting dozens if not hundreds of

Tagged with: , , , , , , , , , ,
Posted in Blog

What’s Your Backup Retention Policy?

What is the default retention policy for your backups? If you are like most organizations we speak to, the answer is typically three or more years. The next question is why, as in why is your backup retention so long?

Tagged with: , , , , , ,
Posted in Blog

Enterprise Class Open SDS – SUSE Enterprise Storage 5.5 Briefing Note

Software Defined Storage (SDS) promises to free organizations from storage hardware lock-in, and to some degree that is true. The problem is SDS then locks the customer into the storage software. Moving from one SDS solution to another is a

Tagged with: , , , , , , , , , , ,
Posted in Briefing Note

An Endpoint Strategy is More Than a Backup Strategy

Endpoints are a growing concern for enterprises, more employees have them (most have two or three), users store more data on them than ever (30% of that data is unique) and the data on these endpoints are within the scope

Tagged with: , , , , , , , , ,
Posted in Blog