Blog Archives

White Paper: What if the Cloud Backed itself Up?

Hybrid IT is the standard by which most organizations operate. Protecting both on-premises and cloud-based data sets is more critical than ever. The problem is that protecting these environments require separate software applications. The process for protecting cloud-native applications is

Tagged with: , , , , , , ,
Posted in White Paper

Should You Protect Unstructured Data Differently?

The focus of backup is now on unstructured data instead of databases. Indeed, protection of databases is as important as it ever has been, but the backup process is probably not the right way to protect that data. Organizations have

Tagged with: , , , , , , ,
Posted in Blog

White Paper: Even All-Flash Needs a Data Management Strategy

All-Flash Arrays (AFA) have one stunning attribute. They are fast. In some cases, an AFA provides more performance than the typical data center needs. As a result, it seems that AFAs render traditional data management practices obsolete. AFAs are typically

Tagged with: , , , , , , , ,
Posted in White Paper

Refining Your GDPR Strategy – Addressing User Data

The European Union’s General Data Protection Regulation (GDPR) deadline for implementation has come and gone. Many organizations have achieved a basic level of compliance, so now is the time to dig deeper, tie up loose ends and try to simplify

Tagged with: , , , , , , , , , , ,
Posted in Blog

What’s the Right Cloud for Enterprise Backup

Selecting a cloud backup solution also means selecting a cloud provider. For enterprises, cloud provider options range from the megacloud providers like Amazon AWS, Microsoft Azure and Google Cloud to small regional providers. Another decision for enterprises is in selecting

Tagged with: , , , , , , , ,
Posted in Blog

Webinar: How to Design a Compliant and GDPR Ready Collaboration System

Users need to collaborate on projects, which means sharing file data with other internal users as well as external business partners. More often than not, to accomplish this file sharing, they leverage cloud-based file-sync and share solutions. The problem is

Tagged with: , , , , , , , ,
Posted in Webinar

Why Do Ransomware Victims Pay?

If ransomware gets through an organization’s defenses, they have two choices. Recover or pay. Given the growth in the number of ransomware attacks, many organizations choose to pay, which only further fuels the industry making the next round of ransomware

Tagged with: , , , , , , ,
Posted in Blog

Three Steps to Moving Legacy Backups to the Cloud

One of the significant challenges regarding data protection is managing its data set. Secondary storage tiers store five to ten times as much data as production data stores and can overwhelm the data center. IT planners are looking to cloud

Tagged with: , , , , , , , , ,
Posted in Blog

The State of Disaster Recovery Planning

Disaster Recovery Plans (DRP) are supposed to be an organization’s playbook if they need to recover critical data center operations after a disaster. The issue is that in most organizations, the DRP is outdated if it exists at all. Disaster

Tagged with: , , , , , , , , , ,
Posted in Blog

Fixing the Broken Archive – Archive360 2018 Update

Data Management (archiving) looks good on the IT whiteboard. It is the process of moving old data from existing primary storage systems to an archive system. The process should free up primary storage capacity, simplify the data protection process and

Tagged with: , , , , , ,
Posted in Briefing Note