Blog Archives

Webinar: Dealing with the Elephant in the Datacenter – How to Protect, Manage, and Leverage Unstructured Data

IT is facing new challenges in managing unstructured data. Organizations want to store more unstructured data and keep it longer for future analysis. However, the protection and retention methods of traditional backup and archive solutions are not keeping pace with

Tagged with: , , , , , , , , ,
Posted in Webinar

The Top Three Cloud Recovery Concerns

The cloud reduces an organization’s disaster recovery (DR) costs while at the same time upgrading its quality. Cloud DR has a mathematical advantage over internal DR. The organization doesn’t have to invest in a DR site nor does it need

Tagged with: , , , , , , , ,
Posted in Blog

Is Encryption Overrated

When the subject of data security comes up, it often begins, and unfortunately, ends with encryption. Indeed, encrypting data is critical, but in most cases, if the hacker or malware program compromises a user or administrator account, then more than

Tagged with: , , , , , ,
Posted in Blog

Webinar: How to Design a 92TB, 500K IOPS AFA for less than $95,000!

All-Flash Arrays are the model of inefficiency and as flash media increases in density and performance, the cost of this inefficiency becomes more obvious. Enterprise solid-state drives (SSD) deliver 70,000 IOPS per drive but most AFAs need 24 drives or

Tagged with: , , , , , , , , ,
Posted in Webinar

DRaaS is For More Than Just Disasters

Disaster Recovery as a Service (DRaaS) enables organizations to improve the recovery response time and lower disaster plan costs. In our recent on demand webinar we not only discussed the value of DRaaS we also provided a live demo of

Tagged with: , , , , , , , ,
Posted in Blog

Using the Cloud Data Fabric for Data Protection

Most organizations use data protection as their first step into the cloud. Unfortunately, that first step, like many first steps, often results in a stumble. If organizations don’t create a cloud data fabric first, they often use an extension to

Tagged with: , , , , , , , , , , ,
Posted in Blog

Making Primary Storage Fulfill the 3-2-1 Rule

The 3-2-1 rule states that an organization should have three copies of data on two different types of media, with IT storing one copy off-site and preferably offline. Traditionally, organizations count on the backup process to meet the 3-2-1 rule’s

Tagged with: , , , , , , , , ,
Posted in Blog

SlideShare: How to Create a Great Disaster Recovery Plan

Many studies indicate that organizations have a shallow confidence level in their ability to recover from a disaster. The disaster recovery plan is often an ad-hoc plan that requires IT to scramble when disaster strikes. If the recovery effort succeeds,

Tagged with: , , , , , , , ,
Posted in Slideshare

Webinar: Using the Cloud to Fix Backup’s Blind Spot – Endpoint Data Protection

Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on

Tagged with: , , , , , , ,
Posted in Webinar

Breach – Preparing Cyber-Secure Storage for the Inevitable

The goal of cyber-secure storage is to eliminate attempts to breach an organization’s storage and access its data. The prior three blogs describe methods IT can take to better protect the organization’s data assets; however, despite all the best efforts,

Tagged with: , , , , , , , ,
Posted in Blog