Blog Archives

How Has Ransomware Changed Data Protection?

The ransomware threat can have a significant monetary impact on the business. Not only are enterprises forced to pay the ransom fee to recover their data, but under various government regulations they also may be charged additional fines per impacted

Tagged with: , , , , , , , , , , ,
Posted in Blog

Breaking Backup with SaaS

Backup is the one process that almost everyone in IT would opt out of if given the choice. In addition to the IT management burden there is often the burden of the infrastructure itself, a never ending need for more

Tagged with: , , , , , , , , , , , , , , , , ,
Posted in Blog

How to Prepare for Site-Wide Disasters

It used to be that natural disasters, such as major hurricanes, were arguably the worst thing that could happen to the enterprise from an IT continuity perspective. Practically speaking, nothing else could really result in a site-wide data center failure.

Tagged with: , , , , , , , , , , ,
Posted in Blog

How to Avoid Cloud Pitfalls to Obtain an Infrastructure-Less Backup Strategy

Meeting requirements for infinite data retention and always-on business continuity is, practically speaking, not possible without using cloud resources in some way. On-premises backup and disaster recovery infrastructures are fraught with unpredictable costs and heavy operational overhead. At the same

Tagged with: , , , , , , , , , , , , , , , , ,
Posted in Blog

MeetTheCEO: Cloud Daddy’s Spencer Kupferman

As businesses migrate more of their data and applications to the cloud, a more comprehensive and mature disaster recovery implementation is required. Cloud service providers have built a base layer of data protection capabilities that focus primarily on enabling recovery

Tagged with: , , , , , , , , , ,
Posted in Webinar

MeetTheCEO: HotLink’s Lynn LeBlanc

Backups cannot be assumed to be safe today, against an emergence of more sophisticated malware. These new variants were designed to be discrete, often sitting idle and being copied across the backup repository to then attack slowly – all with

Tagged with: , , , , , , ,
Posted in Webinar

Hitachi Vantara Updates its Content Platform

Going Beyond Archive with Denser, More Intelligent Object Storage Object storage has long been viewed as an archive and long-term retention platform. But in the age of data-driven business intelligence, more frequent and more sophisticated cyberattacks, and data privacy regulations,

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

What the Enterprise Needs in SaaS Data Protection

Secondary storage is quickly consuming the data center and becoming too complex to manage. The copy data stored on those secondary systems is distributed across multiple enterprise and cloud storage locations. The secondary data set is being used for a

Tagged with: , , , , , , , , , , , , , , , , ,
Posted in Blog

Overcoming Shortcomings of SaaS Based Data Protection

Most organizations don’t make money off their data protection process; instead they view it as an insurance policy in case something goes wrong. These organizations, however, do make sporadic investments in the data protection infrastructure and these investments consume a

Tagged with: , , , , , , , , , , ,
Posted in Blog

Democratizing Disaster Recovery

VeeamON Briefing Note – Veeam Availability Orchestrator 2.0 Disaster Recovery (DR) is about more than just recovering data. When a data center is down and applications need to restart in another location, there is a whole series of events that

Tagged with: , , , , , , , ,
Posted in Briefing Note