Blog Archives

MeetTheCEO: HotLink’s Lynn LeBlanc

Backups cannot be assumed to be safe today, against an emergence of more sophisticated malware. These new variants were designed to be discrete, often sitting idle and being copied across the backup repository to then attack slowly – all with

Tagged with: , , , , , , ,
Posted in Webinar

How to Make One Thousand Snapshots Useful

Almost every modern storage system claims to support “thousands” of snapshots of production data without impacting performance. While some of the lack of performance impact claims have proven to be suspect, there is little doubt that today’s storage solutions support

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Worried About Meeting Disaster Recovery SLAs? Consider These Capabilities

Data protection infrastructures face tremendous pressure. Copy data is growing even faster than production data as businesses create copies to support analytics, test and development, and other important initiatives. Copy data also needs to be retained for longer periods of

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

How to Modernize the Data Protection Architecture

Modernization of various components and processes within the data center is a popular topic with IT professionals. One area of concentration is the data protection architecture. Advances in both software and hardware promise to dramatically reduce recovery times while at

Tagged with: , , , , , , , , , ,
Posted in White Paper

What the Enterprise Needs in SaaS Data Protection

Secondary storage is quickly consuming the data center and becoming too complex to manage. The copy data stored on those secondary systems is distributed across multiple enterprise and cloud storage locations. The secondary data set is being used for a

Tagged with: , , , , , , , , , , , , , , , , ,
Posted in Blog

Can the Cloud Cut Data Protection Costs?

Data protection, including backup and disaster recovery, has always been expensive and a hassle. In fact, it was so much of a hassle that some organizations did not protect their applications. This was because they considered that the cost and

Tagged with: , , , , , , ,
Posted in Blog

Kaminario Drives Composable Storage 2.0

Accelerated performance and usage-based storage for business critical applications A new generation of composable infrastructure that is truly software-only is required to deliver the levels of multi-cloud data mobility, automation, efficiency and flexibility, which are required by modern workloads. These

Tagged with: , , , , , , , ,
Posted in Blog

Cloud Endpoint Protection: Potential Pitfalls to Avoid

Backing up endpoint data is no longer a nice-to-have. Leaving endpoints unprotected leaves critical enterprise data vulnerable to malware, deletion, theft or corruption, and to running afoul of data privacy regulations. This can quickly result in a tarnished brand reputation,

Tagged with: , , , , , , , , , ,
Posted in Blog

White Paper: Protecting the Distributed Enterprise

Organizations, thanks to mergers and acquisitions, are becoming more global. The problem is that a global organization means distributed data centers. It is not uncommon for an organization to have multiple data centers, remote offices with applications and thousands of

Tagged with: , , , , , , , , , , , ,
Posted in White Paper

Analyst Opinion – Time to End Cloud Egress Fees

One of the most common complaints from organizations that have moved at least some workloads to the cloud is the unpredictability of cloud billing, specifically as it relates to egress fees and transactional IO fees. Egress fees are the price

Tagged with: , , , , , ,
Posted in Blog