Blog Archives

StorageShort: The Changing Face of Disasters

When it comes to disaster recovery planning, we tend to focus on grand scale events that impact entire regions of a country. The reality is though that most disasters are smaller in scale. These smaller disasters have a similar severity

Tagged with: , , , , , , , , , ,
Posted in StorageShort

Keeping Office 365 Data Safe with Veeam and KeepItSafe

Beyond Microsoft’s clear position on data, “it’s your data”, it makes more sense to protect Microsoft Office 365 than potentially any other SaaS platform. Office 365 has on-premises versions, so when IT recovers data on-premises the organization can actually operate

Tagged with: , , , , , , , , , ,
Posted in Article

Solving The Challenge with Endpoint Data Strategies

Applying data center data management best practices to endpoints is particularly challenging. As discussed in our prior post, there is the physical challenge that most organizations have hundreds if not thousands of endpoints and those endpoints are mobile. Managing and

Tagged with: , , , , , , , , , , , , ,
Posted in Article

How to Backup Office 365

The case for protecting Office 365 is undeniable. First, Microsoft’s license agreement makes it very clear that the data stored on its service is the user’s and it is the user’s responsibility to protect it. Second, it makes sense to

Tagged with: , , , , , , , ,
Posted in Article

Endpoints – From Laptop Backup to Total Data Management

Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical

Tagged with: , , , , , , , , , , , , ,
Posted in Article

The State of Enterprise Cloud Storage

Cloud storage is typically known for its seemingly infinite capacity and low upfront costs. It also is operationally more economical since the organization does not need to house all the gear in its data center. The outsourcing of the hardware

Tagged with: , , , , , , , , , ,
Posted in Article

Have We Reached VMware Backup Parity?

There was a time not too long ago where the state of VMware backups was bad. It was so bad in fact that entirely new companies emerged to address the problem. These companies took the approach of ignoring the then

Tagged with: , , , , , , , , , ,
Posted in Blog

SlideShare – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Slideshare

Bored with Ransomware? Good it is Not the Primary Problem

There has been a lot, too much maybe, discussion about ransomware and its impact on business. Ransomware is a threat but it is only one of the reasons organizations should protect user endpoints and servers. In a recent Storage Switzerland

Tagged with: , , , , , , , , ,
Posted in Blog

An Endpoint Strategy is More Than a Backup Strategy

Endpoints are a growing concern for enterprises, more employees have them (most have two or three), users store more data on them than ever (30% of that data is unique) and the data on these endpoints are within the scope

Tagged with: , , , , , , , , ,
Posted in Blog