Blog Archives

Why Self-Protecting Production Storage at the Edge?

Enterprises are relying more and more on edge data centers to collect and process critical data in real time. Increasingly, edge data centers require bare metal-levels of performance – but at the same time, these important data streams must be

Tagged with: , , , , , , ,
Posted in Blog

What Constitutes a Complete Data Protection Platform?

Endpoint protection has frequently been treated as an expensive hassle that is not worth it. However, for a number of reasons, organizations can no longer risk leaving employees’ laptops, tablets and other devices unprotected. The major concern is that data

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

How to Prepare for Site-Wide Disasters

It used to be that natural disasters, such as major hurricanes, were arguably the worst thing that could happen to the enterprise from an IT continuity perspective. Practically speaking, nothing else could really result in a site-wide data center failure.

Tagged with: , , , , , , , , , , ,
Posted in Blog

Applying the 3-2-1 Backup Rule to Self-Protecting Primary Storage

Primary storage has two key functions, to deliver data as fast as possible to the applications and users requesting it, and to maintain data accessibility in the event of a hardware failure. Primary storage vendors have attempted to expand their

Tagged with: , , , , , , ,
Posted in Blog

Meet The CEO: ClearSky Data’s Ellen Rubin

Join us live at 2:15 p.m. EST on Monday, July 8 for a unique opportunity to hear ClearSky Data’s CEO, Ellen Rubin, share her perspective on how combining the cloud and the edge can help IT professionals to mitigate –

Tagged with: , , , , , , ,
Posted in Webinar

Actifio Multi-cloud Mobility and DR Automation

Cutting Vendor Lock-in – as well as costs – from the DRaaS Equation Disaster recovery (DR) is too expensive and too cumbersome to meet the near-zero recovery point objectives (RPOs) and recovery time objectives (RTOs) required by today’s business environment.

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Key Security Features to Evaluate in Your Cloud Provider

Cloud storage services have evolved significantly in terms of their ability to provide data security, as well as their ability to comply with data privacy regulations such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

Can the Cloud Cut Data Protection Costs?

Data protection, including backup and disaster recovery, has always been expensive and a hassle. In fact, it was so much of a hassle that some organizations did not protect their applications. This was because they considered that the cost and

Tagged with: , , , , , , ,
Posted in Blog

Is Enterprise File Sync and Share the Same as Data Protection?

Enterprise file sync and share (EFSS) services enable files that are stored either in an on-premises storage array or a cloud service, to be shared among multiple users and accessed by remote endpoint devices or desktops. Enterprise-grade EFSS services designed

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

You Will be Breached – What’s Next for Recoverability?

As ransomware variants grow in number and sophistication, it is practically inevitable that enterprises will be breached. Users are becoming more aware, but eventually there will be some users in the enterprise that click on something they shouldn’t. At the

Tagged with: , , , , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 22,159 other followers

Blog Stats
  • 1,498,392 views