Blog Archives

Solving the Unstructured Data Protection Problem by Creating A Cloud Foundation

When organizations try to establish a cloud strategy, one of the challenges they face is where to begin. The problem is the cloud can do so much, like run applications, and provide advanced services and store data, to name just

Tagged with: , , , , , , , , ,
Posted in Blog

Overcoming HCI Transition Problems

As they consider a potential transition to a hyperconverged architecture (HCI), organizations need to decide how to migrate data to the HCI platform. They also need to decide what to do with their legacy storage infrastructure that still will be

Tagged with: , , , , , , , , , ,
Posted in Blog

Protecting the Other Door – Application Vulnerabilities

Ransomware gets a lot of attention from IT professionals and data protection vendors alike. Ransomware however, is only one door that bad actors can use to compromise the data center. Another door is application or operating system vulnerability. While several

Tagged with: , , , , , , ,
Posted in Briefing Note

Key Management – The Dirty Secret of HCI Encryption

Edge data centers can be remote retail locations or offices, oil rigs, temporary command centers and even mobile data centers in the back of a van. Finding a solution that provides the performance edge data centers need at a price

Tagged with: , , , , , , , , , , ,
Posted in Article

Lightboard Video: Fulfilling The SDS Promise

Central to the promise of software-defined storage (SDS) is the core tenet that organizations have a single interface to manage all of their diverse storage resources. Unlike most SDS solutions, which fail to fulfill this core principle, DataCore Software is

Tagged with: , , , , , , , , , ,
Posted in Video

Lightboard Video: How to Move to HCI while retaining the best of SANs

Hyperconverged infrastructure (HCI) vendors claim the elimination of Storage Area Networks (SANs) as one of their key advantages. Yet they fail to consider the investments made in those SANs-simply expecting you to disregard those valuable assets and start from scratch.

Tagged with: , , , , , , , , , ,
Posted in Video

In Search of True DRaaS – Datrium Delivers the DRaaS We Expected

Disaster Recovery as a Service (DRaaS) burst on the scene about four years ago. However, most DRaaS solutions don’t exactly live up to expectations. Frequently built on backup, these are solutions that try to make recovery act like high availability.

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

Unlocking Software Defined Storage

Software-defined storage (SDS) is a concept that sometimes benefits vendors more so than it benefits customers. Most SDS vendors are shifting from a model that was software only to one that includes hardware. SDS is still advantageous to these vendors

Tagged with: , , , , , , , , ,
Posted in Briefing Note

What Constitutes a Complete Data Protection Platform?

Endpoint protection has frequently been treated as an expensive hassle that is not worth it. However, for a number of reasons, organizations can no longer risk leaving employees’ laptops, tablets and other devices unprotected. The major concern is that data

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

Multi-Cloud versus the Five Requirements of Data – Datrium Briefing Note

Organizations need to meet five core requirements of the data they store; encryption, mobility, performance, retention and disaster recovery. To deliver these elements, IT is often forced to use five or more products just for on-premises data, let alone the

Tagged with: , , , , , , , , ,
Posted in Briefing Note