Blog Archives

Is it Time for All-Flash Backups?

Businesses today are all about “agile.” For storage professionals, this means delivering ultra-low latency alongside high throughput and high input/output (I/O) operations per second (IOPS) to accelerate mission-critical application performance as much as possible. All-flash storage arrays have solidified their

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

On Demand Webinar: Will Your Backup Architecture Meet Tomorrow’s SLAs? 3 Steps to Make Sure!

Organizations, application owner and users all have much higher expectations of IT than ever before. They expect IT to recover real-time data instantaneously and recall aged data very quickly. These expectations mean that backup architectures are getting stretched at both

Tagged with: , , , , , , , , , ,
Posted in Webinar

Lightboard Video: Improve Efficiency by Recovering from Storage Snapshots

Businesses are counting on IT for competitive differentiation. The problem is that IT teams are bogged down with day-to-day tasks, especially when it comes to data protection. Watch this Lightboard Video to learn how to integrating data protection into production

Tagged with: , , , , , , , , ,
Posted in Video

Rethinking Your Data Governance Strategy for Compliance

In today’s era of regulations, the role of archive and long-term retention data is changing dramatically. No longer can data simply be shipped off to a “cheap and deep” repository with the hope that it will never need to be

Tagged with: , , , , , , , , , , ,
Posted in Blog

How to Design a Modern Data Protection Architecture

Data Protection is changing. Today backup software can recover in-place, instantiating volumes directly on the backup storage which enables organizations to significantly reduce recovery windows. Consequently, the performance of the backup storage hardware matters more than ever. At the same

Tagged with: , , , , , , , , ,
Posted in Article

Is it Time for Application-Focused Storage?

Service level agreements (SLAs) for application availability for business continuity, and for performance, are more demanding than ever before. Each application often has specific SLA requirements, which results in multi-vendor, heterogeneous IT infrastructures that are challenging to manage. As a

Tagged with: , , , , , , , , , , , , , ,
Posted in Article

Applying the 3-2-1 Backup Rule to Self-Protecting Primary Storage

Primary storage has two key functions, to deliver data as fast as possible to the applications and users requesting it, and to maintain data accessibility in the event of a hardware failure. Primary storage vendors have attempted to expand their

Tagged with: , , , , , , ,
Posted in Blog

Meet The CEO: ClearSky Data’s Ellen Rubin

Join us for a unique opportunity to hear ClearSky Data’s CEO, Ellen Rubin, share her perspective on how combining the cloud and the edge can help IT professionals to mitigate – or to eradicate entirely – physical storage management duties.

Tagged with: , , , , , , ,
Posted in Webinar

Data Protection Versus Hyperconverged Data Protection

As applications’ data protection requirements become more unique, many enterprises are considering a hyperconverged data protection solution so they can “just drop in” a node to meet expansion needs. While at the surface this sounds like an agile and simple

Tagged with: , , , , , , , ,
Posted in Article

MeetTheCEO: Cloud Daddy’s Spencer Kupferman

As businesses migrate more of their data and applications to the cloud, a more comprehensive and mature disaster recovery implementation is required. Cloud service providers have built a base layer of data protection capabilities that focus primarily on enabling recovery

Tagged with: , , , , , , , , , ,
Posted in Webinar