Blog Archives

Live Demo: Disaster Recovery as a Service in Action

By leveraging the cloud, Disaster Recovery as a Service (DRaaS) eliminates many of the costs associated with a DR site, changing it from a capital cost to an operational cost. Does DRaaS sound too good to be true? Can organizations

Tagged with: , , , , , , , ,
Posted in Webinar

Live Webinar: The Next Question: How to Backup Office 365

The first Office 365 question is, do organizations need to protect their data stored there? The answer is yes, Office 365 data needs protection. Almost every industry expert recommends that organizations take Office 365 protection into their own hands and

Tagged with: , , , , , , , ,
Posted in Webinar

Ransomware Changes Backup Software

The threat of ransomware has put IT on its toes. The pressure is on to backup everything more frequently and to make sure that recoveries happen faster than a BitCoin transaction. Backup software manufacturers need to up their capabilities too.

Tagged with: , , , , , , ,
Posted in Article

Performance vs. Security vs. Management – How to Solve the Primary Storage Paradox

Applications and users demand unprecedented levels of performance, cyber-threats like ransomware require new levels of security and access control, and organizations are intolerant of any form of downtime or data loss. At the same time, they need to manage data

Tagged with: , , , , , , , , , ,
Posted in Article

Securing Backups from Ransomware

Ransomware “developers” know that organizations are likely to count on their backups as a primary point of recovery if they are infected. As a result, these malware programs attempt to encrypt or disrupt backup operations. Other cyber attacks may even

Tagged with: , , , , , , , , , ,
Posted in Blog

True WAN Optimization is not Deduplication – Bridgeworks Briefing Note

The four walls of the data center no longer confine users, applications, and data. Organizations are multi-site, and users want to work from anywhere. Making “work from anywhere” a reality still requires data and data still has gravity. Data has

Tagged with: , , , , , , ,
Posted in Briefing Note

Cyber-Secure Storage Requires More Than Encryption

Encryption is a fundamental element of building a secure storage system, but organizations need more than just encryption. Encryption works when the outside attacker can’t authenticate themselves, but if the outside attacker can compromise a user or admin account, then

Tagged with: , , , , , , ,
Posted in Blog