Blog Archives

Analyst Blog: Do you have a Private Cloud or Just Virtualized Servers?

IT in companies of all sizes is facing competition from the cloud. Based on a self-service, automated provisioning model, public clouds enjoy efficiencies and economics that few corporate data centers can match today. But internal IT has a distinct advantage,

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Orchestrating Copy Data

2015 will be THE year of copy data management. Multiple vendors will bring solutions to the market. Many of these solutions will leverage snapshot technology in one form or another in an effort to reduce the capacity requirements of secondary

Tagged with: , , , , , , , ,
Posted in Article

How Snapshots CAN Be Backups – Podcast

Snapshots have been part of the backup process for years, enabling traditional backup systems to reduce their impact on operations. But can you use snapshots to replace the backup itself? Historically, the answer has been “no”. But now, with new

Tagged with: , , , , , , ,
Posted in Podcast

Analyst Blog: Should Enterprises replace NAS with Object Storage?

Network Attached Storage (NAS) has served the enterprise data center for well over two decades. Originally designed for storing user home directories, these systems have evolved to handle a wide variety of data sets including databases and virtual machine images.

Tagged with: , , , , , , , , , ,
Posted in Blog

Briefing Note: Catalogic releases Zero-Touch Copy Data Solution

If primary data is growing, the copies made of that data are exploding, with a growth rate expected to be 10X that of primary data. These copies are most often used for data protection, test/development, compliance, archive, and analytics. Fortunately,

Tagged with: , , , , , , , , ,
Posted in Blog

Analyst Blog: Data Protection Workshops become Design-shops in 2015

Our second year of Data Protection Workshops, in conjunction with TechTarget/Storage Decisions, are underway and coming to a city near you. The theme of this year’s sessions will be breaking the rules of data protection to meet the stricter and

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Briefing Note: Asigra Converges Data Protection without lowering expectations

As we discussed in our article “Service Level Objectives What do RPO, RTO, VRO and GRO Mean?” enterprises need, and now are beginning, to demand a broad spectrum of data protection options to match different use cases. For example, the

Tagged with: , , , , , , , , , , , , , , , ,
Posted in Briefing Note

What’s causing the Copy Data Explosion

Remember back when companies had copy machines in every department? Making copies was a tedious exercise that probably wasted more paper than anything else. But for the IT department, creating copies (data copies) is a far more serious problem, one

Tagged with: , , , , ,
Posted in Blog

Does Post Process Deduplication have a Role in the Future of Deduplication

In a recent article “The State of Deduplication in 2015” we took a look at how deduplication is impacting the data center. Deduplication continues to change how data protection is performed and it is dramatically changing primary storage, most notably

Tagged with: , , , , , ,
Posted in Blog

Analyst Blog: Why Cloud File Sync and Share is not Backup

In a recent briefing note we discussed the need for backing up cloud-based productivity applications, also called Software-as-a-Service (SaaS), such as GoogleDocs, Office365 or SalesForce.com. People often assume that because these services are storing their data in the cloud, that

Tagged with: , , , , , , ,
Posted in Blog