Blog Archives

SlideShare: The Three Reasons Cloud Backup is Broken and How to Fix It

The cloud was supposed to be the answer to IT’s backup dilemma; instead, it in some ways has made the situation worse. In this on demand webinar Storage Switzerland and Microsoft Azure have a roundtable discussion on what’s gone wrong

Tagged with: , , , , , , ,
Posted in Slideshare

SlideShare: How to Design a Compliant and GDPR Ready Collaboration System

Users need to collaborate on projects, which means sharing file data with other internal users as well as external business partners. More often than not, to accomplish this file sharing, they leverage cloud-based file-sync and share solutions. The problem is

Tagged with: , , , , , , , ,
Posted in Slideshare

The Top 5 Reasons VMware Backups Still Break

Lack of Auto-Discovery Lack of auto-discovery is an issue for most backup solutions. As virtual machines and physical hosts are constantly being added to a VMware environment, many backup applications can’t auto-discover them. This means a new VM can go

Tagged with: , , , , , , , , , ,
Posted in Blog

Performance vs. Security vs. Management – How to Solve the Primary Storage Paradox

Applications and users demand unprecedented levels of performance, cyber-threats like ransomware require new levels of security and access control, and organizations are intolerant of any form of downtime or data loss. At the same time, they need to manage data

Tagged with: , , , , , , , , , ,
Posted in Article

Webinar: What’s Breaking Your VMware Backups? And How You Can Fix Them Quickly

Backing up VMware successfully has always been a challenge. The introduction of the cloud ever increasing scale of VMware infrastructure continues to give backups fits and makes it even harder. Please join George Crump, Lead Analyst at Storage Switzerland and

Tagged with: , , , , , , , , , ,
Posted in Webinar

Securing Backups from Ransomware

Ransomware “developers” know that organizations are likely to count on their backups as a primary point of recovery if they are infected. As a result, these malware programs attempt to encrypt or disrupt backup operations. Other cyber attacks may even

Tagged with: , , , , , , , , , ,
Posted in Blog

True WAN Optimization is not Deduplication – Bridgeworks Briefing Note

The four walls of the data center no longer confine users, applications, and data. Organizations are multi-site, and users want to work from anywhere. Making “work from anywhere” a reality still requires data and data still has gravity. Data has

Tagged with: , , , , , , ,
Posted in Briefing Note

Cyber-Secure Storage Requires More Than Encryption

Encryption is a fundamental element of building a secure storage system, but organizations need more than just encryption. Encryption works when the outside attacker can’t authenticate themselves, but if the outside attacker can compromise a user or admin account, then

Tagged with: , , , , , , ,
Posted in Blog

Current Data Protection Infrastructure Is Broken

Some of the more sizeable shifts in the data center include the move from Mainframes to Open Systems and network computing, the move to client-server computing, and the move to a virtualized server infrastructure. Each of these shifts spawned several

Tagged with: , , , , , , , ,
Posted in Blog