Blog Archives

SlideShare: Evolving Data Protection from Backup to Copy Data Management

Copy Data Management promises to not only improve the data protection process, it promises to provide value to the organization even without a looming disaster. It can reduce storage costs by presenting virtual copies of data to test/dev, analytics and

Tagged with: , , , , , , , , ,
Posted in Slideshare

Protecting Against Departing Users

One of the top ways that data “leaks” out of an organization is through the endpoints (laptops, tablets, and smartphones) of departing users. IT should, of course, do what it can to prevent data leakage, but it also should make

Tagged with: , , , , , , , , ,
Posted in Blog

Embracing the Cloud for More Effective Endpoint Disaster Recovery

In a world where enterprise mobility and cyber-attacks are simultaneously booming, protecting endpoints has become crucial to business longevity. Laptops are the primary target for malware such as ransomware. Also, these devices are prone to being lost or stolen –

Tagged with: , , , , , , , , ,
Posted in Blog

The Rising Ransomware Threat Heightens Urgency for Endpoint Protection

The ransomware threat continues to grow – and this is indeed significant, as ransomware cost businesses $5 billion during 2017, according to Cisco. Many organizations that have been attacked are paying the ransom demanded, causing the number of attacks to

Tagged with: , , , , , , , , ,
Posted in Blog

Is the Ransomware Scare Over?

In 2017, Ransomware attacks like WannaCry and Locky made headlines as organizations worldwide were infected. Data protection vendors of all types went to work hardening their solutions and advancing them to help customers recover from the threat. However, ransomware attacks

Tagged with: , , , , , , , , ,
Posted in Blog

Disaster Recovery with Cloud as Primary Storage

The first blog in this series discussed initially using a Cloud as Primary Storage solution for data protection and then in the second blog in the series, transitioning to using the Cloud as Primary Storage to store production data. In

Tagged with: , , , , , , , , ,
Posted in Blog

Webinar: Designing Storage Architectures for Data Privacy, Compliance and Governance

Managing data is about more than managing capacity growth; organizations today need to adhere to increasingly strict data privacy, compliance and governance regulations. Privacy regulations like GDPR and California’s Consumer Privacy Act place new expectations on organizations that require them

Tagged with: , , , , , , , , ,
Posted in Webinar

Webinar – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Webinar

SlideShare: The Future Data Center – Live from Hitachi Next!

What comes after Data Center Modernization? The future data center is smart. But what is a smart data center, how do you create a smart data center and why would you want to? We answer all of these questions on

Tagged with: , , , , , , , ,
Posted in Slideshare

Your Data Center is Talking to You – Can You Understand it?

Data centers not only store and process the organization’s data they also create a lot of data on their own. Every device in a data center is logging its actions and activity about what it’s doing, what is accessing it

Tagged with: , , , , , , , ,
Posted in Blog