Blog Archives

Three Key Steps to Endpoint Protection

In a world where data is only becoming more critical to the business, many enterprises look over the fact that endpoints are the weak link when it comes to data protection and availability. Data does not only live in the

Tagged with: , , , , , , , , , ,
Posted in Blog

Democratizing Disaster Recovery

VeeamON Briefing Note – Veeam Availability Orchestrator 2.0 Disaster Recovery (DR) is about more than just recovering data. When a data center is down and applications need to restart in another location, there is a whole series of events that

Tagged with: , , , , , , , ,
Posted in Briefing Note

5 Critical Enterprise Cloud Backup Capabilities – Requirement 3: Flexible Recovery

On-premises backup infrastructure is expensive and cumbersome to manage. At the same time, many enterprises are rapidly running out of available data center floorspace. As discussed on a recent Storage Switzerland webinar with Carbonite, cloud storage services offer a path

Tagged with: , , , , , , , , , , ,
Posted in Blog

What is Automatically Archiving Primary Storage?

A recent Storage Switzerland Webinar “How to Design Self-Protecting Production Storage and Gain Backup Independence” introduced the concept of self-protecting primary storage but what about self-archiving primary storage? The value of self-protecting primary storage is that it improves the quality

Tagged with: , , , , , , ,
Posted in Blog

Considering Adopting DRaaS? Look for a Comprehensive Software Tool

Disaster recovery is one of the most appealing use cases for the cloud. Disaster recovery-as-a-service (DRaaS) enables the business to avoid the investment of building and managing a separate data center that must perform up to par with production systems,

Tagged with: , , , , , , , , , ,
Posted in Blog

Avoid Cache Misses to Accelerate Application Performance

Backup storage infrastructure is notoriously expensive and cumbersome, but data accessibility and retention is needed to address business intelligence, test and development, malware protection and data privacy regulation compliance requirements. Storage professionals should consider developing a primary storage protection that

Tagged with: , , , , , , ,
Posted in Blog

5 Critical Enterprise Cloud Backup Capabilities – Requirement 2: Complete Platform Coverage

The agility and utility-based cost structure of the cloud makes it an appealing backup target that can help storage managers to keep pace with today’s modern insights and privacy-driven world. However, many cloud backup solutions fall short when it comes

Tagged with: , , , , , , , , , , ,
Posted in Blog

Moving on From Mozy Endpoint

Protecting laptops, tablets, and smartphones (endpoints) are more critical than ever. Users use endpoints of all types to create data essential to the organization, but the user may never store that data on a corporate (and protected) fileserver. One of

Tagged with: , , , , , , , , , , , , , ,
Posted in Article

Understanding the Value of Cloud Based Services

File serving is evolving to file collaboration and the cloud is an ideal destination for this evolved use case. The file system, the software behind the file server, needs to change to keep up with this evolved use case. Simply

Tagged with: , , , , , , , ,
Posted in Blog

Why Current Data Protection Architectures Miss the Mark

In response to the increased need for rapid recovery, longer data retention and the desire to support the cloud for vaulting and disaster recovery, alternative solutions are appearing on the market to try and correct the shortcomings of legacy architectures.

Tagged with: , , , , , , , , , ,
Posted in Blog