Blog Archives

Live Webinar: Understanding the 5 Most Common Oversights in a DRaaS Strategy

Disaster Recovery as a Service (DRaaS) is potentially one of the best use cases for cloud resources. DR sites owned by the organization are expensive to set up and maintain as well as challenging to get to when a disaster

Tagged with: , , , , , , , , , ,
Posted in Webinar

StorageShort: The Changing Face of Disasters

When it comes to disaster recovery planning, we tend to focus on grand scale events that impact entire regions of a country. The reality is though that most disasters are smaller in scale. These smaller disasters have a similar severity

Tagged with: , , , , , , , , , ,
Posted in StorageShort

Keeping Office 365 Data Safe with Veeam and KeepItSafe

Beyond Microsoft’s clear position on data, “it’s your data”, it makes more sense to protect Microsoft Office 365 than potentially any other SaaS platform. Office 365 has on-premises versions, so when IT recovers data on-premises the organization can actually operate

Tagged with: , , , , , , , , , ,
Posted in Article

Understanding the Cost of Data Protection Infrastructure

Protecting primary storage is significantly more expensive than the actual cost of primary storage. While, in most cases, data protection storage doesn’t need to perform at the same level as primary storage, it does need to provide acceptable performance, and

Tagged with: , , , , , , , , ,
Posted in Blog

The Problem with Gold-Only Data Protection Service Levels

A recent Storage Switzerland webinar dealt with the impact of the massive increase in the number of applications that data centers support on the data protection architecture. How does IT apply the right level of protection, set service levels, for

Tagged with: , , , , , , , , , ,
Posted in Blog

Solving The Challenge with Endpoint Data Strategies

Applying data center data management best practices to endpoints is particularly challenging. As discussed in our prior post, there is the physical challenge that most organizations have hundreds if not thousands of endpoints and those endpoints are mobile. Managing and

Tagged with: , , , , , , , , , , , , ,
Posted in Article

How to Backup Office 365

The case for protecting Office 365 is undeniable. First, Microsoft’s license agreement makes it very clear that the data stored on its service is the user’s and it is the user’s responsibility to protect it. Second, it makes sense to

Tagged with: , , , , , , , ,
Posted in Article

Endpoints – From Laptop Backup to Total Data Management

Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical

Tagged with: , , , , , , , , , , , , ,
Posted in Article

SlideShare: Application Explosion – Rediscovering the Lost Art of Protection Service Levels

The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the

Tagged with: , , , , , , , , , ,
Posted in Slideshare

What is Consumption Based Data Protection?

The data protection process has three key costs; the software that protects data; the hardware that drives that software and stores protected copies of data and the administration time required to manage the process. The upfront costs are a challenge

Tagged with: , , , , , , , , ,
Posted in Blog