Blog Archives

Does Microsoft Office 365 Need to be Protected?

It is increasingly common for enterprises to offload mission-critical applications such as Microsoft Exchange to cloud service providers; in fact, Microsoft’s software-as-a-service (SaaS)-delivered Office 365 revenue has surpassed its conventional Office revenue since the fourth quarter of 2017, pointing to

Tagged with: , , , , , , , , , ,
Posted in Blog

SlideShare: All in the Cloud – Data Protection Up, Costs Down

Managing and protecting critical data across servers and applications in multiple locations around the globe is challenging. And the more decentralized and complex your infrastructure, the more difficult it is to manage your data. The potential bad news? Data loss,

Tagged with: , , , , ,
Posted in Slideshare

Adopting Value-Based Data Governance to Meet Modern Data Privacy Needs

Data privacy is a universal concern for enterprises, and not only because of the rise of regulations such as the European Union’s General Data Protection Regulation (GDPR). By and large, consumers have higher expectations in terms of how businesses are

Tagged with: , , , , , , , , ,
Posted in Blog

Cloud Storage: More Than Your Digital Dumping Ground

Enterprises are dealing with an onslaught of data that is being generated outside of a traditional, centralized data center. Simply put, data is everywhere, being generated in an expanding number of branch and remote offices, by a growing number of

Tagged with: , , , , , ,
Posted in Blog

Solving the Right to be Forgotten Problem with Intelligent Unstructured Data Management

The European Union’s (EU) General Data Protection Regulation (GDPR) has contributed to an overall greater awareness among both consumers and enterprises of the value of data. As discussed in a previous Storage Switzerland blog, the value of and requirement for

Tagged with: , , , , , , , ,
Posted in Blog

Continuous Data Protection for Greater IT Resilience – Zerto Briefing Note

The need for data protection transformation is pressing. Typically, IT employs multiple point solutions with long backup windows to provide “best effort” recovery point objectives (RPOs) and recovery time objectives (RTOs). However, in today’s business environment, a “best effort” RPO

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

How is Consumption-based IT Different than Cloud Services and Leasing?

Modern businesses are storing a greater volume and variety of data, and they are looking to get more out of that data – accessing it more frequently and analyzing it in greater depth to facilitate better decision making. Against this

Tagged with: , , , , , , , , , ,
Posted in Blog

Why Data Protection-as-a-Service is Unpredictable

Economic unpredictability is the most significant challenge associated with data protection. The pool of data that must be protected continues to grow exponentially, and meanwhile, recoveries must be nearly instantaneous. Our previous blog discussed the challenges inherent in meeting these

Tagged with: , , , , , , , , , , ,
Posted in Blog

Keeping Up With the Data Center, Modernizing Data Protection – Veeam 9.5 Update 4 Briefing Note

The data center continues to evolve, and data protection has to keep pace. Organizations want to intelligently leverage cloud resources to augment their on-premises data protection capabilities, and they need to respond to increased scrutiny of protected copies from regulations

Tagged with: , , , , , , , ,
Posted in Briefing Note

The Impact of Unpredictable Data Protection

Most production IT projects are planned months, if not years, in advance of deployment. However, advanced planning of infrastructure upgrades for the data protection architecture seldom occurs. The problem is that updates to the backup infrastructure can often be expensive

Tagged with: , , , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 17.4K other subscribers
Blog Stats
  • 1,996,611 views