Blog Archives

Top Four Data Analytics Challenges: Challenge 1: Business and IT Disconnect

Data analytics has become table stakes for competitive differentiation. As a result, businesses require their analytics-driven insights as quickly as possible. The reality is, however, that queries often take weeks or even months to complete. One of the key logjams

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Applying the 3-2-1 Backup Rule to Self-Protecting Primary Storage

Primary storage has two key functions, to deliver data as fast as possible to the applications and users requesting it, and to maintain data accessibility in the event of a hardware failure. Primary storage vendors have attempted to expand their

Tagged with: , , , , , , ,
Posted in Blog

Meet The CEO: ClearSky Data’s Ellen Rubin

Join us live at 2:15 p.m. EST on Monday, July 8 for a unique opportunity to hear ClearSky Data’s CEO, Ellen Rubin, share her perspective on how combining the cloud and the edge can help IT professionals to mitigate –

Tagged with: , , , , , , ,
Posted in Webinar

Key Security Features to Evaluate in Your Cloud Provider

Cloud storage services have evolved significantly in terms of their ability to provide data security, as well as their ability to comply with data privacy regulations such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

How Ransomware and GDPR Break Image Based Backups and How to Fix It

Image based backups, after the initial backup is complete, only backup change blocks within the item they are protecting. The technology enables organizations to frequently backup critical servers and applications. It also enables the protection of file servers with millions

Tagged with: , , , , , , ,
Posted in Briefing Note

Hitachi Vantara Updates its Content Platform

Going Beyond Archive with Denser, More Intelligent Object Storage Object storage has long been viewed as an archive and long-term retention platform. But in the age of data-driven business intelligence, more frequent and more sophisticated cyberattacks, and data privacy regulations,

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

Can the Cloud Cut Data Protection Costs?

Data protection, including backup and disaster recovery, has always been expensive and a hassle. In fact, it was so much of a hassle that some organizations did not protect their applications. This was because they considered that the cost and

Tagged with: , , , , , , ,
Posted in Blog

Is Enterprise File Sync and Share the Same as Data Protection?

Enterprise file sync and share (EFSS) services enable files that are stored either in an on-premises storage array or a cloud service, to be shared among multiple users and accessed by remote endpoint devices or desktops. Enterprise-grade EFSS services designed

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 22,148 other followers

Blog Stats