Blog Archives

Webinar: How to Design a 92TB, 500K IOPS AFA for less than $95,000!

All-Flash Arrays are the model of inefficiency and as flash media increases in density and performance, the cost of this inefficiency becomes more obvious. Enterprise solid-state drives (SSD) deliver 70,000 IOPS per drive but most AFAs need 24 drives or

Tagged with: , , , , , , , , ,
Posted in Webinar

DRaaS is For More Than Just Disasters

Disaster Recovery as a Service (DRaaS) enables organizations to improve the recovery response time and lower disaster plan costs. In our recent on demand webinar we not only discussed the value of DRaaS we also provided a live demo of

Tagged with: , , , , , , , ,
Posted in Blog

Using the Cloud Data Fabric for Data Protection

Most organizations use data protection as their first step into the cloud. Unfortunately, that first step, like many first steps, often results in a stumble. If organizations don’t create a cloud data fabric first, they often use an extension to

Tagged with: , , , , , , , , , , ,
Posted in Blog

Making Primary Storage Fulfill the 3-2-1 Rule

The 3-2-1 rule states that an organization should have three copies of data on two different types of media, with IT storing one copy off-site and preferably offline. Traditionally, organizations count on the backup process to meet the 3-2-1 rule’s

Tagged with: , , , , , , , , ,
Posted in Blog

SlideShare: How to Create a Great Disaster Recovery Plan

Many studies indicate that organizations have a shallow confidence level in their ability to recover from a disaster. The disaster recovery plan is often an ad-hoc plan that requires IT to scramble when disaster strikes. If the recovery effort succeeds,

Tagged with: , , , , , , , ,
Posted in Slideshare

Webinar: Using the Cloud to Fix Backup’s Blind Spot – Endpoint Data Protection

Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on

Tagged with: , , , , , , ,
Posted in Webinar

Breach – Preparing Cyber-Secure Storage for the Inevitable

The goal of cyber-secure storage is to eliminate attempts to breach an organization’s storage and access its data. The prior three blogs describe methods IT can take to better protect the organization’s data assets; however, despite all the best efforts,

Tagged with: , , , , , , , ,
Posted in Blog

How to Reduce the TCO of Data Protection Infrastructure

The growth of primary storage has an exponential effect on data protection infrastructure. Demands to protect data more frequently, recover faster and retain data longer promise to make the situation worse. The total cost of ownership (TCO) of the data

Tagged with: , , , , , , , ,
Posted in Blog

Webinar: Why Cloud Migrations Fail – Learn the Keys to Cloud Success

Many cloud migration and cloud first strategies fail to live up to expectations. The problem is organizations spend too much time on micro issues like product selection and not enough time on big picture items like the cloud strategy’s foundation.

Tagged with: , , , , , , , , ,
Posted in Webinar

SlideShare: What’s Breaking Your VMware Backups? And How You Can Fix Them Quickly

Backing up VMware successfully has always been a challenge. The introduction of the cloud ever increasing scale of VMware infrastructure continues to give backups fits and makes it even harder. Please join George Crump, Lead Analyst at Storage Switzerland and

Tagged with: , , , , , , , , , ,
Posted in Slideshare