Blog Archives

SlideShare: How to “Future Proof” Data Protection for Organizational Resilience

Users expectations of IT’s ability to return mission critical applications to production are higher than ever. These expectations are leading IT to abandon many of their backup and recovery solutions to try new, unproven solutions that may or may not

Tagged with: , , , , , , , , ,
Posted in Slideshare

Protecting From Ransomware without a Data Protection Overhaul

Ransomware is at the top of every IT professional’s project list, but the problem is most solutions to the problem require the replacement of the current data protection product. What if the current data protection solution is servicing the organization

Tagged with: , , , , , , , , ,
Posted in Briefing Note

ChalkTalk Video: Your DR Plan Needs Three Buckets

All applications are not the same but most organization treat them that way. The problem with treating all application equally is it increases the cost of your disaster recovery effort and, in most cases, decreases your ability to meet expectations.

Tagged with: , , , , , , , , ,
Posted in Video

How to Avoid DRaaS Lock-in with Hybrid Cloud

Open or software defined solutions promise flexibility and prevent organizations from falling into vendor lock-in. That is until it comes to disaster recovery (DR); especially DRaaS (disaster recovery as a service). Many DRaaS solutions lock the organization into a single

Tagged with: , , , , , , , , , , ,
Posted in Blog

Where Should Copy Data Reside?

Copy data is getting a lot of attention and solutions to manage it are flooding to market. But a question few of these solutions let you ask is, “WHERE should that copy data reside?” For the most part, they assume

Tagged with: , , , , , , , , , ,
Posted in Blog

How Hybrid Cloud Helps DR

Given the increased threats facing organizations today, a single DR site is no longer good enough. Instead organizations need to apply a hybrid cloud mentality to their disaster recovery strategies. What Will You Fail? The most important data after a

Tagged with: , , , , , , , , , ,
Posted in Blog

StorageShort: How To Classify Your Applications for DR

Storage Switzerland’s W. Curtis Preston suggests in a recent video the key to a successful DR plan is classifying your applications into recovery buckets or priorities. But how exactly do you determine which applications should go into which bucket? In

Tagged with: , , , , , , , , ,
Posted in StorageShort

StorageShort: The Recovery Paradox – Close Copy vs. Far

One of the challenges to designing a successful disaster recovery solution is where to keep copies of your data. A close copy allows for a rapid recovery in the event of a failure since it is seconds away. But in

Tagged with: , , , , , ,
Posted in StorageShort

How Do You End Ransomware?

Here we go again. Friday, a ransomware attack hit the England’s National Health Care System. And according to sources they are paying! Once again we are rewarding bad behavior. The only way to end ransomware is to dry up its

Tagged with: , , , ,
Posted in Blog

Best Next Steps for the Hybrid Cloud

Companies that are deciding to leverage a hybrid cloud infrastructure have a number of options available to them that others do not. But since the concept of hybrid cloud is still so new, it’s not always obvious what the choices

Tagged with: , , , , , , , ,
Posted in Blog