Blog Archives

The Anatomy of the Copy Data Problem

Countless IT processes count on copies of data. Backup is an obvious example, but test/dev, analytics processing, reporting, and file auditing are others. Various studies have indicated that copy data can consume as much as 10X the space consumed by

Tagged with: , , , , , , , , ,
Posted in Blog

Webinar: What’s Your 2019 NVMe Strategy?

The flash optimized NVMe protocol has been on the market for over a year and the technology is available in several forms. NVMe, both storage and networking (NVMe over Fabrics) is more expensive than the typical SAS based solution and

Tagged with: , , , , , , , , , ,
Posted in Webinar

SlideShare: Evolving Data Protection from Backup to Copy Data Management

Copy Data Management promises to not only improve the data protection process, it promises to provide value to the organization even without a looming disaster. It can reduce storage costs by presenting virtual copies of data to test/dev, analytics and

Tagged with: , , , , , , , , ,
Posted in Slideshare

Protecting Against Departing Users

One of the top ways that data “leaks” out of an organization is through the endpoints (laptops, tablets, and smartphones) of departing users. IT should, of course, do what it can to prevent data leakage, but it also should make

Tagged with: , , , , , , , , ,
Posted in Blog

Embracing the Cloud for More Effective Endpoint Disaster Recovery

In a world where enterprise mobility and cyber-attacks are simultaneously booming, protecting endpoints has become crucial to business longevity. Laptops are the primary target for malware such as ransomware. Also, these devices are prone to being lost or stolen –

Tagged with: , , , , , , , , ,
Posted in Blog

The Rising Ransomware Threat Heightens Urgency for Endpoint Protection

The ransomware threat continues to grow – and this is indeed significant, as ransomware cost businesses $5 billion during 2017, according to Cisco. Many organizations that have been attacked are paying the ransom demanded, causing the number of attacks to

Tagged with: , , , , , , , , ,
Posted in Blog

Is the Ransomware Scare Over?

In 2017, Ransomware attacks like WannaCry and Locky made headlines as organizations worldwide were infected. Data protection vendors of all types went to work hardening their solutions and advancing them to help customers recover from the threat. However, ransomware attacks

Tagged with: , , , , , , , , ,
Posted in Blog

Disaster Recovery with Cloud as Primary Storage

The first blog in this series discussed initially using a Cloud as Primary Storage solution for data protection and then in the second blog in the series, transitioning to using the Cloud as Primary Storage to store production data. In

Tagged with: , , , , , , , , ,
Posted in Blog

Webinar: Designing Storage Architectures for Data Privacy, Compliance and Governance

Managing data is about more than managing capacity growth; organizations today need to adhere to increasingly strict data privacy, compliance and governance regulations. Privacy regulations like GDPR and California’s Consumer Privacy Act place new expectations on organizations that require them

Tagged with: , , , , , , , , ,
Posted in Webinar

Webinar – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Webinar

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 17.4K other subscribers
Blog Stats
  • 1,996,626 views