Blog Archives

How DR Orchestration Can Improve Success while Lowering Costs

To the organization, all applications are essential, but not all apps are critical. There is a pecking order in terms of what applications need to be back online first. Recovery prioritization is especially crucial during a full-scale disaster where the

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Why DR Orchestration is a Must Have

Disasters rarely strike at a convenient time, like when recovery polices are all up to date, and when there are plenty of IT staff on hand to deal with any issues that may come up. In most cases, the opposite

Tagged with: , , , , , , , , , , ,
Posted in Blog

What is the State of Software Defined Storage?

Software Defined Storage (SDS) abstracts the storage software from the storage hardware. It sounds great on paper and looks great on the whiteboard but in execution it fails to impress. Storage Switzerland finds that the large majority of customers still

Tagged with: , , , , , , , , ,
Posted in Blog

Overcoming The Cloud Goldilocks Problem – iland Briefing Note

When an organization decides to begin its cloud journey, one of the biggest challenges is trying to find a cloud provider that is the right fit. Typically, the IT planner has to choose from the mega-cloud providers like Amazon AWS,

Tagged with: , , , , , , ,
Posted in Briefing Note

How Has Ransomware Changed Data Protection?

The ransomware threat can have a significant monetary impact on the business. Not only are enterprises forced to pay the ransom fee to recover their data, but under various government regulations they also may be charged additional fines per impacted

Tagged with: , , , , , , , , , , ,
Posted in Blog

Why Self-Protecting Production Storage at the Edge?

Enterprises are relying more and more on edge data centers to collect and process critical data in real time. Increasingly, edge data centers require bare metal-levels of performance – but at the same time, these important data streams must be

Tagged with: , , , , , , ,
Posted in Blog

What Constitutes a Complete Data Protection Platform?

Endpoint protection has frequently been treated as an expensive hassle that is not worth it. However, for a number of reasons, organizations can no longer risk leaving employees’ laptops, tablets and other devices unprotected. The major concern is that data

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

How to Prepare for Site-Wide Disasters

It used to be that natural disasters, such as major hurricanes, were arguably the worst thing that could happen to the enterprise from an IT continuity perspective. Practically speaking, nothing else could really result in a site-wide data center failure.

Tagged with: , , , , , , , , , , ,
Posted in Blog

Applying the 3-2-1 Backup Rule to Self-Protecting Primary Storage

Primary storage has two key functions, to deliver data as fast as possible to the applications and users requesting it, and to maintain data accessibility in the event of a hardware failure. Primary storage vendors have attempted to expand their

Tagged with: , , , , , , ,
Posted in Blog

Meet The CEO: ClearSky Data’s Ellen Rubin

Join us live at 2:15 p.m. EST on Monday, July 8 for a unique opportunity to hear ClearSky Data’s CEO, Ellen Rubin, share her perspective on how combining the cloud and the edge can help IT professionals to mitigate –

Tagged with: , , , , , , ,
Posted in Webinar