Blog Archives

Unlocking Software Defined Storage

Software-defined storage (SDS) is a concept that sometimes benefits vendors more so than it benefits customers. Most SDS vendors are shifting from a model that was software only to one that includes hardware. SDS is still advantageous to these vendors

Tagged with: , , , , , , , , ,
Posted in Briefing Note

What Constitutes a Complete Data Protection Platform?

Endpoint protection has frequently been treated as an expensive hassle that is not worth it. However, for a number of reasons, organizations can no longer risk leaving employees’ laptops, tablets and other devices unprotected. The major concern is that data

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

Multi-Cloud versus the Five Requirements of Data – Datrium Briefing Note

Organizations need to meet five core requirements of the data they store; encryption, mobility, performance, retention and disaster recovery. To deliver these elements, IT is often forced to use five or more products just for on-premises data, let alone the

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Key Security Features to Evaluate in Your Cloud Provider

Cloud storage services have evolved significantly in terms of their ability to provide data security, as well as their ability to comply with data privacy regulations such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

How Ransomware and GDPR Break Image Based Backups and How to Fix It

Image based backups, after the initial backup is complete, only backup change blocks within the item they are protecting. The technology enables organizations to frequently backup critical servers and applications. It also enables the protection of file servers with millions

Tagged with: , , , , , , ,
Posted in Briefing Note

StorMagic Encryption Key Manager and KVM Support Briefing Note

Cutting the Encryption and Hypervisor Taxes for the Edge and Small Data Centers Edge data centers are quickly becoming important hubs where mission-critical data is processed. Hyperconverged infrastructure (HCI) poses an attractive architecture to serve these environments, but there are

Tagged with: , , , , , ,
Posted in Briefing Note

Is Your Application Performance Too Slow? Consider Computational Storage

The modern workload set has fundamentally changed the nature of and also how we handle data sets. Previously, critical business applications were typically driven by the processing of large, monolithic databases that were comprised of large files. Today, more and

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

New eBook: Taking The Load off Networks with Computational Storage

The data center is a series of networks. There are networks that connect servers to users and networks that connect storage to servers. Even within servers and storage there are networks to connect CPU to IO devices like flash drives

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Is Enterprise File Sync and Share the Same as Data Protection?

Enterprise file sync and share (EFSS) services enable files that are stored either in an on-premises storage array or a cloud service, to be shared among multiple users and accessed by remote endpoint devices or desktops. Enterprise-grade EFSS services designed

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

Cloud Endpoint Protection: Potential Pitfalls to Avoid

Backing up endpoint data is no longer a nice-to-have. Leaving endpoints unprotected leaves critical enterprise data vulnerable to malware, deletion, theft or corruption, and to running afoul of data privacy regulations. This can quickly result in a tarnished brand reputation,

Tagged with: , , , , , , , , , ,
Posted in Blog