Blog Archives

Live Webinar: Will Your Backup Architecture Meet Tomorrow’s SLAs? 3 Steps to Make Sure!

Organizations, application owner and users all have much higher expectations of IT than ever before. They expect IT to recover real-time data instantaneously and recall aged data very quickly. These expectations mean that backup architectures are getting stretched at both

Tagged with: , , , , , , , , , ,
Posted in Webinar

Snapshots: Your Data Protection Budget Killer

The modern business relies on copy data for a number of mission-critical functions. As a result, more copies must be created, and they must be stored for a longer amount of time. In the event of an outage, data loss

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

What is Automatically Archiving Primary Storage?

A recent Storage Switzerland Webinar “How to Design Self-Protecting Production Storage and Gain Backup Independence” introduced the concept of self-protecting primary storage but what about self-archiving primary storage? The value of self-protecting primary storage is that it improves the quality

Tagged with: , , , , , , ,
Posted in Blog

Using Copy Data Management to Bolster Compliance

As Storage Switzerland frequently blogs, the future is compliance-heavy. The European Union (EU) General Data Protection Regulation (GDPR) is just the start, influencing the formulation of other regulations such as the California Consumer Privacy Act (CCPA) as well as a

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

Avoid Cache Misses to Accelerate Application Performance

Backup storage infrastructure is notoriously expensive and cumbersome, but data accessibility and retention is needed to address business intelligence, test and development, malware protection and data privacy regulation compliance requirements. Storage professionals should consider developing a primary storage protection that

Tagged with: , , , , , , ,
Posted in Blog

Moving on From Mozy Endpoint

Protecting laptops, tablets, and smartphones (endpoints) are more critical than ever. Users use endpoints of all types to create data essential to the organization, but the user may never store that data on a corporate (and protected) fileserver. One of

Tagged with: , , , , , , , , , , , , , ,
Posted in Article

The Requirements of a Modern Data Protection Architecture

Previously, Storage Switzerland wrote about the challenges of trying to meet modern data protection requirements with legacy technologies, including the inability to scale-out and limited cloud integration. We also discussed the pros and cons of new backup appliances and converged

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Why Current Data Protection Architectures Miss the Mark

In response to the increased need for rapid recovery, longer data retention and the desire to support the cloud for vaulting and disaster recovery, alternative solutions are appearing on the market to try and correct the shortcomings of legacy architectures.

Tagged with: , , , , , , , , , ,
Posted in Blog

Why Metadata Might be Impeding Your Flash Performance

Metadata is an often overlooked but leading storage performance bottleneck. Metadata maps how files are stored on disks, and it summarizes characteristics of file attributes such as author and last date of access. As such, it is crucial to data

Tagged with: , , , , , , , , , ,
Posted in Blog

Is Your Data Protection Architecture Holding You Back?

In most organizations the data protection architecture has gone unchanged for almost a decade. It’s true that certain components within the architecture change because of technological advances or forced refreshes but the basic design remains the same. The challenge with

Tagged with: , , , , , , , , , , ,
Posted in Blog