Blog Archives

Embracing the Cloud for More Effective Endpoint Disaster Recovery

In a world where enterprise mobility and cyber-attacks are simultaneously booming, protecting endpoints has become crucial to business longevity. Laptops are the primary target for malware such as ransomware. Also, these devices are prone to being lost or stolen –

Tagged with: , , , , ,
Posted in Blog

The Rising Ransomware Threat Heightens Urgency for Endpoint Protection

The ransomware threat continues to grow – and this is indeed significant, as ransomware cost businesses $5 billion during 2017, according to Cisco. Many organizations that have been attacked are paying the ransom demanded, causing the number of attacks to

Tagged with: , , , , , , , , ,
Posted in Blog

Is the Ransomware Scare Over?

In 2017, Ransomware attacks like WannaCry and Locky made headlines as organizations worldwide were infected. Data protection vendors of all types went to work hardening their solutions and advancing them to help customers recover from the threat. However, ransomware attacks

Tagged with: , , , , , , , , ,
Posted in Blog

Disaster Recovery with Cloud as Primary Storage

The first blog in this series discussed initially using a Cloud as Primary Storage solution for data protection and then in the second blog in the series, transitioning to using the Cloud as Primary Storage to store production data. In

Tagged with: , , , , , , , , ,
Posted in Blog

Live Webinar: Designing Storage Architectures for Data Privacy, Compliance and Governance

Managing data is about more than managing capacity growth; organizations today need to adhere to increasingly strict data privacy, compliance and governance regulations. Privacy regulations like GDPR and California’s Consumer Privacy Act place new expectations on organizations that require them

Tagged with: , , , , , , , , ,
Posted in Webinar

Live Webinar – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Webinar

SlideShare: The Future Data Center – Live from Hitachi Next!

What comes after Data Center Modernization? The future data center is smart. But what is a smart data center, how do you create a smart data center and why would you want to? We answer all of these questions on

Tagged with: , , , , , , , ,
Posted in Slideshare