Blog Archives

The Impact of Application Sprawl on Protection Service Levels

In our on demand webinar “Application Explosion – Rediscovering the Lost Art of Service Levels” we discuss how IT can successfully continue to set service levels in environments where the number of applications they need to support is growing every

Tagged with: , , , , , , , , , ,
Posted in Blog

The Rising Ransomware Threat Heightens Urgency for Endpoint Protection

The ransomware threat continues to grow – and this is indeed significant, as ransomware cost businesses $5 billion during 2017, according to Cisco. Many organizations that have been attacked are paying the ransom demanded, causing the number of attacks to

Tagged with: , , , , , , , , ,
Posted in Blog

Revamping Your Endpoint Protection Strategy to Minimize Downtime and Data Loss

Endpoint protection threatens to be the Achilles heel of modern IT shops. The need to protect endpoints has been around for decades – but doing so remains largely painful, especially as enterprise mobility usage proliferates. Protecting hundreds or thousands of

Tagged with: , , , , , , , ,
Posted in Blog

Is the Ransomware Scare Over?

In 2017, Ransomware attacks like WannaCry and Locky made headlines as organizations worldwide were infected. Data protection vendors of all types went to work hardening their solutions and advancing them to help customers recover from the threat. However, ransomware attacks

Tagged with: , , , , , , , , ,
Posted in Blog

Protecting Your Data Protection’s Blind Side – Endpoints

Laptops, smartphones, and tablets are how users get work done. A surprising amount of organizational data is stored exclusively on laptops, never touching data center storage. Endpoints are also on the front lines of business where they are the most

Tagged with: , , , , , , , ,
Posted in Blog

The Changing Scope of Disaster Recovery

Disaster Recovery, for most organizations, used to mean making sure that a handful of mission-critical applications were protected and able to be brought back online in the event of a data center failure. The data center of today has changed

Tagged with: , , , , , , , , , , ,
Posted in Blog

SlideShare: Data Management vs. GDPR and Data Privacy – How to Solve the Right to Be Forgotten Problem

The General Data Protection Regulation (GDPR) makes specific demands on organizations based in and doing business in the European Union (EU). Now several US states are considering similar legislation and California has already passed a GDPR-like law. Clearly this is

Tagged with: , , , , , ,
Posted in Slideshare

How to Prevent Data Leaks in a Collaborative World – MyWorkDrive Version 5 Briefing Note

Collaboration and Data Leak Prevention (DLP) seem to be at odds with each other. Collaboration requires sharing data and it seems like copying that data to a sharing service is the only viable alternative. The only way IT can protect

Tagged with: , , , , , , , ,
Posted in Briefing Note

Disaster Recovery with Cloud as Primary Storage

The first blog in this series discussed initially using a Cloud as Primary Storage solution for data protection and then in the second blog in the series, transitioning to using the Cloud as Primary Storage to store production data. In

Tagged with: , , , , , , , , ,
Posted in Blog

Why SDN Should be Part of Your Cloud Strategy

Organizations are incorporating public cloud resources into their deployment strategies. The organization may have a cloud-first initiative, or it may use the cloud as determined by the workload but the reality is that an overwhelming number of organizations deploy in

Tagged with: , , , , , , , , , ,
Posted in Blog