A recent Storage Switzerland webinar dealt with the impact of the massive increase in the number of applications that data centers support on the data protection architecture. How does IT apply the right level of protection, set service levels, for…
A recent Storage Switzerland webinar dealt with the impact of the massive increase in the number of applications that data centers support on the data protection architecture. How does IT apply the right level of protection, set service levels, for…
Applying data center data management best practices to endpoints is particularly challenging. As discussed in our prior post, there is the physical challenge that most organizations have hundreds if not thousands of endpoints and those endpoints are mobile. Managing and…
The case for protecting Office 365 is undeniable. First, Microsoft’s license agreement makes it very clear that the data stored on its service is the user’s and it is the user’s responsibility to protect it. Second, it makes sense to…
Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical…
The data protection process has three key costs; the software that protects data; the hardware that drives that software and stores protected copies of data and the administration time required to manage the process. The upfront costs are a challenge…
In our on demand webinar, “2019 Storage Strategies Series – What’s Your Plan for Object Storage?” one of the key points of discussion will be about the cloud. Most cloud providers have a tier of storage built from object storage…
The method that IT uses to protect applications is changing. Gone are the days of three or four mission critical applications. Today the backup team at most data centers needs to concern itself with protecting dozens if not hundreds of…
Endpoints are a growing concern for enterprises, more employees have them (most have two or three), users store more data on them than ever (30% of that data is unique) and the data on these endpoints are within the scope…