Blog Archives

Why Do Ransomware Victims Pay?

If ransomware gets through an organization’s defenses, they have two choices. Recover or pay. Given the growth in the number of ransomware attacks, many organizations choose to pay, which only further fuels the industry making the next round of ransomware

Tagged with: , , , , , , ,
Posted in Blog

Webinar: How to Create a Great Disaster Recovery Plan

Many studies indicate that organizations have a shallow confidence level in their ability to recover from a disaster. The disaster recovery plan is often an ad-hoc plan that requires IT to scramble when disaster strikes. If the recovery effort succeeds,

Tagged with: , , , , , , , ,
Posted in Webinar

The Importance of Consolidation for Secure Storage

The Security Problems with Multi-Vendor Data Storage One of the most common data center trends is storage system sprawl. In today’s data center, every environment or workload has a unique storage architecture. While dispersed storage does allow IT to target

Tagged with: , , , , , , ,
Posted in Blog

Dealing with the AI and Analytics Data Explosion – MapR Briefing Note

Accuracy and response time defines the success or failure of an AI or analytics project. The faster and more accurate the response the more trusted the system is. The more data provided to the project the more accurate it becomes.

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Are You Ready for Ransomware’s Next Phase?

Ransomware has been a thorn in the side of IT professionals for over five years. What those professionals have seen so far though is just the tip of the iceberg. At the same time that IT is improving its response

Tagged with: , , , , , , ,
Posted in Blog

Webinar: Five Things to Look for in Your Next All-Flash Array

The first generation of all-flash arrays has come and gone. For many organizations, the time is now to consider the “next” all-flash array. In our on demand webinar, Storage Switzerland and X-IO Storage discuss five things to look for in

Tagged with: , , , , , , , , , ,
Posted in Webinar

SlideShare: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?

Believe it or not, it has been a year since WannaCry crippled organizations around the world, and since that time ransomware attacks have only accelerated. The ransomware “industry” is now a $5 billion market and is projected to grow to

Tagged with: , , , , , , ,
Posted in Slideshare

What are Ransomware Attack Loops and How to Prevent Them – Asigra Briefing Note

Ransomware is the “new” disaster with which every data center, regardless of location, needs to be concerned. IT must take steps to protect the organization’s data, and even its brand from ransomware. A successful defense against ransomware requires user training

Tagged with: , , , , , , , ,
Posted in Briefing Note

Webinar: Backup vs. Ransomware – 5 Requirements for Backup Success

Ransomware is the universal threat. No matter an organization’s data center location, or its size, it can be devastated by a ransomware attack. While most organizations focus on the periphery, they also need to be prepared for a breach, something

Tagged with: , , , , , , ,
Posted in Webinar

Making Cloud Backup Work for Enterprises

Cloud backup is an ideal complement to an enterprise’s existing backup strategy. The problem is most cloud backup solutions seek to replace the solution already in place. Enterprises don’t want to throw away years of investment in training and processes

Tagged with: , , , , , , , , , ,
Posted in Blog