Blog Archives

How to Reduce the TCO of Data Protection Infrastructure

The growth of primary storage has an exponential effect on data protection infrastructure. Demands to protect data more frequently, recover faster and retain data longer promise to make the situation worse. The total cost of ownership (TCO) of the data

Tagged with: , , , , , , , ,
Posted in Blog

Webinar: Why Cloud Migrations Fail – Learn the Keys to Cloud Success

Many cloud migration and cloud first strategies fail to live up to expectations. The problem is organizations spend too much time on micro issues like product selection and not enough time on big picture items like the cloud strategy’s foundation.

Tagged with: , , , , , , , , ,
Posted in Webinar

SlideShare: What’s Breaking Your VMware Backups? And How You Can Fix Them Quickly

Backing up VMware successfully has always been a challenge. The introduction of the cloud ever increasing scale of VMware infrastructure continues to give backups fits and makes it even harder. Please join George Crump, Lead Analyst at Storage Switzerland and

Tagged with: , , , , , , , , , ,
Posted in Slideshare

SlideShare: Backup vs. Ransomware – 5 Requirements for Backup Success

Ransomware is the universal threat. No matter an organization’s data center location, or its size, it can be devastated by a ransomware attack. While most organizations focus on the periphery, they also need to be prepared for a breach, something

Tagged with: , , , , , , ,
Posted in Slideshare

Webinar: Eliminate Backups and Simplify DR with Hybrid Cloud Storage

The cloud should be a valuable ally in helping organizations eliminate backup infrastructure and increase their disaster recovery (DR) confidence. The reality is that current cloud backup and DR solutions fall short because they don’t fully exploit cloud resources. Most

Tagged with: , , , , , ,
Posted in Webinar

What to do if Ransomware Strikes a Physical System

With ransomware, unlike almost any other form of disaster, there is an alternative to recovering from backups…pay the ransom. While one can argue the risk associated with paying a ransom, the organization may see it as a viable option. IT

Tagged with: , , , , , , , ,
Posted in Blog

The Challenges of After-The-Fact Encryption

Encryption is a foundational component of a cyber-secure storage system. The problem is that most organizations implement encryption after-the-fact, months if not years after the initial implementation. When IT is considering a new storage system, they tend to focus on

Tagged with: , , , , , , , ,
Posted in Blog

ChalkTalk Video: Key Architecture Requirements for Tackling Hadoop and NoSQL Backup and Recovery

NoSQL and Hadoop typically distribute data through the use of built-in replication technology. The replication process also provides protection from media or server failure. Many IT professionals, as a result, think that they don’t need to backup these environments. In

Tagged with: , , , , , , , , ,
Posted in Video

ChalkTalk Video: On-Premises All-Flash as a Service

One of the advantages of the cloud is organization’s can start a new project with minimal capital outlay. The problem is that as that project matures and moves into production the cost and ability to control the cloud become issues.

Tagged with: , , , , , , ,
Posted in Video

ChalkTalk Video: Simple, Affordable and Reliable Disaster Recovery

Disaster Recovery has been a long time challenge for IT Professionals and Senior Executives. In this session George Crump and Clint Wyckoff with Datrium discuss how to intelligently respond to disaster scenarios with simple application-level DR orchestration. You’ll also walk

Tagged with: , , , , , , , ,
Posted in Video