Blog Archives

How to Avoid Cloud Backup Pitfalls

Data protection becomes more challenging as enterprises become more distributed. Data is distributed across core and edge data center environments, and on and off-premises applications and infrastructure resources. This data must be readily accessible by users regardless of their location

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Three Key Steps to Endpoint Protection

In a world where data is only becoming more critical to the business, many enterprises look over the fact that endpoints are the weak link when it comes to data protection and availability. Data does not only live in the

Tagged with: , , , , , , , , , ,
Posted in Blog

Webinar: Will Your Backup Architecture Meet Tomorrow’s SLAs? 3 Steps to Make Sure!

Organizations, application owner and users all have much higher expectations of IT than ever before. They expect IT to recover real-time data instantaneously and recall aged data very quickly. These expectations mean that backup architectures are getting stretched at both

Tagged with: , , , , , , , , , ,
Posted in Webinar

Snapshots: Your Data Protection Budget Killer

The modern business relies on copy data for a number of mission-critical functions. As a result, more copies must be created, and they must be stored for a longer amount of time. In the event of an outage, data loss

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

What is Automatically Archiving Primary Storage?

A recent Storage Switzerland Webinar “How to Design Self-Protecting Production Storage and Gain Backup Independence” introduced the concept of self-protecting primary storage but what about self-archiving primary storage? The value of self-protecting primary storage is that it improves the quality

Tagged with: , , , , , , ,
Posted in Blog

Using Copy Data Management to Bolster Compliance

As Storage Switzerland frequently blogs, the future is compliance-heavy. The European Union (EU) General Data Protection Regulation (GDPR) is just the start, influencing the formulation of other regulations such as the California Consumer Privacy Act (CCPA) as well as a

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

Avoid Cache Misses to Accelerate Application Performance

Backup storage infrastructure is notoriously expensive and cumbersome, but data accessibility and retention is needed to address business intelligence, test and development, malware protection and data privacy regulation compliance requirements. Storage professionals should consider developing a primary storage protection that

Tagged with: , , , , , , ,
Posted in Blog

Moving on From Mozy Endpoint

Protecting laptops, tablets, and smartphones (endpoints) are more critical than ever. Users use endpoints of all types to create data essential to the organization, but the user may never store that data on a corporate (and protected) fileserver. One of

Tagged with: , , , , , , , , , , , , , ,
Posted in Article

The Requirements of a Modern Data Protection Architecture

Previously, Storage Switzerland wrote about the challenges of trying to meet modern data protection requirements with legacy technologies, including the inability to scale-out and limited cloud integration. We also discussed the pros and cons of new backup appliances and converged

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Why Current Data Protection Architectures Miss the Mark

In response to the increased need for rapid recovery, longer data retention and the desire to support the cloud for vaulting and disaster recovery, alternative solutions are appearing on the market to try and correct the shortcomings of legacy architectures.

Tagged with: , , , , , , , , , ,
Posted in Blog