Blog Archives

What is the Data Governance Gap?

In the past most data related regulations focused on data protection and disaster recovery. The European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA), as well as other soon-to-come regulations, continue to have data protection and

Tagged with: , , , , , , , , , , ,
Posted in Blog

Embracing Cloud Storage Services for Data Durability and Availability

Legacy storage architectures are notoriously expensive and complex. Factor in the blazing pace at which data growth is accelerating, alongside rising pressure from the business for ubiquitous and always-on data availability, and a new nightmare is brewing for IT –

Tagged with: , , , , , , , , ,
Posted in Blog

The State of Enterprise Cloud Storage

Cloud storage is typically known for its seemingly infinite capacity and low upfront costs. It also is operationally more economical since the organization does not need to house all the gear in its data center. The outsourcing of the hardware

Tagged with: , , , , , , , , , ,
Posted in Article

Busting the NVMe Flash Myths

NVMe is the next wave of all-flash systems coming to market. These systems are fast, dense and scalable. They promise to fundamentally change the way IT designs storage architectures in support of existing applications, and they open up new possibilities

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

SlideShare – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Slideshare

Bored with Ransomware? Good it is Not the Primary Problem

There has been a lot, too much maybe, discussion about ransomware and its impact on business. Ransomware is a threat but it is only one of the reasons organizations should protect user endpoints and servers. In a recent Storage Switzerland

Tagged with: , , , , , , , , ,
Posted in Blog

What is Consumption Based Data Protection?

The data protection process has three key costs; the software that protects data; the hardware that drives that software and stores protected copies of data and the administration time required to manage the process. The upfront costs are a challenge

Tagged with: , , , , , , , , ,
Posted in Blog

How the Rights of the Digital Citizen Impacts Storage Infrastructure

In our on demand webinar, “Designing Storage Architectures for Data Privacy, Compliance and Governance” we discuss the impact of regulations like the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) on storage architectures. One of

Tagged with: , , , , , , , , ,
Posted in Blog

NEW! Exclusive Insight on Storage, SDN, SDS, and The Cloud

Subscribers to Storage Switzerland’s Newsletter now have access to our exclusive analysis of recent news and trends within the storage software-defined data center as well as the cloud. The report is sent out (almost) daily to subscribers and provides analysis

Tagged with: , , , ,
Posted in Blog

Webinar: Consumption Based Data Management Providing Peace of Mind

Consumption based IT is a curated set of IT solutions that focus on business outcomes. As the name implies it is purchased on a pay-as-you-go model. The goal of consumption based IT is to simplify establishing IT infrastructure that incorporates

Tagged with: , , , , , , , , ,
Posted in Webinar

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 17.4K other subscribers
Blog Stats
  • 1,996,624 views