Blog Archives

StorageShort: The Changing Face of Disasters

When it comes to disaster recovery planning, we tend to focus on grand scale events that impact entire regions of a country. The reality is though that most disasters are smaller in scale. These smaller disasters have a similar severity

Tagged with: , , , , , , , , , ,
Posted in StorageShort

The Problem with Gold-Only Data Protection Service Levels

A recent Storage Switzerland webinar dealt with the impact of the massive increase in the number of applications that data centers support on the data protection architecture. How does IT apply the right level of protection, set service levels, for

Tagged with: , , , , , , , , , ,
Posted in Blog

Solving The Challenge with Endpoint Data Strategies

Applying data center data management best practices to endpoints is particularly challenging. As discussed in our prior post, there is the physical challenge that most organizations have hundreds if not thousands of endpoints and those endpoints are mobile. Managing and

Tagged with: , , , , , , , , , , , , ,
Posted in Article

Endpoints – From Laptop Backup to Total Data Management

Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical

Tagged with: , , , , , , , , , , , , ,
Posted in Article

SlideShare: Application Explosion – Rediscovering the Lost Art of Protection Service Levels

The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the

Tagged with: , , , , , , , , , ,
Posted in Slideshare

Designing a File Storage Infrastructure – CTERA Briefing Note

The combined value of files that an organization creates and stores is higher than its most mission-critical applications. The ability to collaborate, share and retain files both within and outside the organization dictates how competitive that organization is in its

Tagged with: , , , , , ,
Posted in Blog

Can Your Service Levels Keep Up With the Application Explosion?

The method that IT uses to protect applications is changing. Gone are the days of three or four mission critical applications. Today the backup team at most data centers needs to concern itself with protecting dozens if not hundreds of

Tagged with: , , , , , , , , , ,
Posted in Blog

An Endpoint Strategy is More Than a Backup Strategy

Endpoints are a growing concern for enterprises, more employees have them (most have two or three), users store more data on them than ever (30% of that data is unique) and the data on these endpoints are within the scope

Tagged with: , , , , , , , , ,
Posted in Blog

Is File Sync and Share OK for Endpoint Backup?

A surprising number of organizations and users consider their file sync and share (FSS) solution to be a suitable replacement for backup. With an FSS solution if a user accidentally deletes a file the FSS service can provide the user

Tagged with: , , , , , , , , , ,
Posted in Blog

The Impact of Application Sprawl on Protection Service Levels

In our upcoming webinar “Application Explosion – Rediscovering the Lost Art of Service Levels” we will discuss how IT can successfully continue to set service levels in environments where the number of applications they need to support is growing every

Tagged with: , , , , , , , , , ,
Posted in Blog