Blog Archives

Webinar: The Three New Requirements of Unstructured Data Protection – Can your backup deliver?

Because of the ability to mine it for information, unstructured data is becoming the most valuable data asset that many organizations have. The more unstructured data an organization has, the greater its value to the organization becomes. The growth in

Tagged with: , , , ,
Posted in Webinar

Webinar: Three Reasons Storage Security is Failing and How to Fix It

An organization’s data is constantly under attack. Whether it’s through ransomware attacks, cyber-threats or employee misguidedness, all expose organizational data and put it at risk. Encryption and access control are the keys to securing data and cyber resiliency, but most

Tagged with: , , , , , ,
Posted in Webinar

The Problem with One-Way Cloud Scaling – FittedCloud Briefing Note

In theory, organizations can grow and shrink their public cloud footprint on demand. But, the reality is that most don’t, they only scale one-way, up. The typical process is that IT provisions a set of resources for a given workload

Tagged with: , , , , , ,
Posted in Blog

SlideShare: 3 Steps to Controlling the Secondary Storage Deluge

Primary storage is no longer the most expensive tier of storage. Secondary storage, storage that stores copies, backups and archives, is now far more expensive than primary storage. The growth of this tier threatens to bury the data center under

Tagged with: , , , , , ,
Posted in Slideshare

Solving the Hybrid-Cloud Data Management Problem – Elastifile Briefing Note

Executive leadership wants IT to move the organization to the cloud but does not realize that from a data management perspective, the cloud is akin to the wild, Wild West. To move applications requires refactoring them, and meeting the performance

Tagged with: , , , , , , , , ,
Posted in Briefing Note

The Hub Problem with Distributed Backup

Protecting data at remote offices and distributed data centers is challenging to say the least. Typically, organizations try to implement backup locally by installing a backup server and some disk or tape. IT then tries to manage the process remotely

Tagged with: , , , , , , , , , ,
Posted in Blog

What is IO Acceleration? – JetStream Software Briefing Note

Flash’s first deployment in the data center was often as a cache implementation. A cache is a staging area that holds a small amount of the most recently accessed data. Caching software enables active data to be accessed from flash

Tagged with: , , , , , , , ,
Posted in Briefing Note

Webinar: Three Reasons Why Object Storage is the Best Defense against Ransomware Attacks

Backups, by themselves, are not an effective defense against a ransomware attack. The systems that store backup data also require protection, but backup storage is as vulnerable to a ransomware attack as production data, if not more so. If both

Tagged with: , , , , , , , ,
Posted in Webinar

Hyperconvergence is NOT Backup

One of the riskiest claims a vendor ever makes is “we’ve eliminated the need for backup” and hyperconverged infrastructure (HCI) vendors make this claim frequently. Good data resiliency is not good backup, and in fact, some of the work that

Tagged with: , , , , , , , , , ,
Posted in Blog