Blog Archives

How to Avoid DRaaS Lock-in with Hybrid Cloud

Open or software defined solutions promise flexibility and prevent organizations from falling into vendor lock-in. That is until it comes to disaster recovery (DR); especially DRaaS (disaster recovery as a service). Many DRaaS solutions lock the organization into a single

Tagged with: , , , , , , , , , , ,
Posted in Blog

Where Should Copy Data Reside?

Copy data is getting a lot of attention and solutions to manage it are flooding to market. But a question few of these solutions let you ask is, “WHERE should that copy data reside?” For the most part, they assume

Tagged with: , , , , , , , , , ,
Posted in Blog

How Hybrid Cloud Helps DR

Given the increased threats facing organizations today, a single DR site is no longer good enough. Instead organizations need to apply a hybrid cloud mentality to their disaster recovery strategies. What Will You Fail? The most important data after a

Tagged with: , , , , , , , , , ,
Posted in Blog

StorageShort: How To Classify Your Applications for DR

Storage Switzerland’s W. Curtis Preston suggests in a recent video the key to a successful DR plan is classifying your applications into recovery buckets or priorities. But how exactly do you determine which applications should go into which bucket? In

Tagged with: , , , , , , , , ,
Posted in StorageShort

Exploiting Ransomware’s Fatal Flaw

Ransomware has one fatal flaw. Organizations that know how to exploit this flaw can almost eliminate this cyber-attack from their list of concerns. Ironically the flaw is found in their very action it takes to hold organizations hostage – it

Tagged with: , , , , , ,
Posted in Blog

SlideShare: You Bought All-Flash, Now What?

Have you made the jump to all-flash storage? Are you planning to? If so this webinar is for you. We will look at what’s next after (or before) the jump to all-flash. An all-flash array brings many benefits to the

Tagged with: , , , , , , , ,
Posted in Slideshare

Should Backup Software Companies Build an Appliance?

A little over 15 years ago we started to see the creation of the backup appliance market with the creation of the deduplication backup target appliance. Since that time, we’ve gone from having no backup appliances to having so many

Tagged with: , , , , , , , , ,
Posted in Article

How Data Management Protects Against Cyber-Attacks

The reason that file data is a prime target of ransomware attacks is that most file servers are full of juicy targets that organizations are willing to pay to get back. Payment is, after all, exactly what ransomware is all

Tagged with: , , , , , , , , , ,
Posted in Blog

StorageShort: The Recovery Paradox – Close Copy vs. Far

One of the challenges to designing a successful disaster recovery solution is where to keep copies of your data. A close copy allows for a rapid recovery in the event of a failure since it is seconds away. But in

Tagged with: , , , , , ,
Posted in StorageShort