Blog Archives

End-User Acceptance, Priority 1 for Enterprise Endpoint Backup

There are a lot of excellent reasons to deploy an enterprise-wide data protection strategy and at the top of the list is protecting users from Ransomware. One of the critical challenges, though, to successfully deploying an enterprise-wide endpoint backup strategy,

Tagged with: , , , , , , , , , , ,
Posted in Blog

Webinar: Enterprise Cloud Migration – 4 Problems to Solve

The biggest challenge any enterprise has to get over when migrating workloads to the cloud is SCALE! Large organizations have massive amounts of data; thousands of virtual machines and hundreds of terabytes of data. With this level of scale, migration

Tagged with: , , , , , , , , , ,
Posted in Webinar

Primary Storage Should Secure Itself – RackTop Systems Briefing Note

News of another data breach is becoming all too common of an occurrence. The cost to the organization is not just its reputation but increasingly results in punitive fines. The European Union’s General Data Protection Regulation (GDPR) set a new

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

The Big Fail – Why is Enterprise File Sync and Share STILL Failing?

A recent Forrester survey indicated that 56% of enterprise respondents either have implemented an Enterprise File Sync and Share (EFSS) solution or are in the process of installing one. At first glance, that looks good for EFSS vendors. However, on

Tagged with: , , , , , , , ,
Posted in Blog

A Real-World Disaster Recovery Plan – Step 1 – DR Gap Analysis

Disaster Recovery Planning (DRP) doesn’t need to be the lengthy complicated ordeal many make it out to be. In fact, DRP needs to become a more nimble process that is completed quickly, easily updated and frequently tested. The first step

Tagged with: , , , , , , , ,
Posted in Video

Ransomware: The Problem with Paying the Ransom

When ransomware hits an organization, it is very tempting simply to pay the ransom instead of going through the time and effort to replace the encrypted data by recovering from a backup. After paying the ransom, the hackers give a

Tagged with: , , , , , , , ,
Posted in Blog

Using DRaaS For Test-Dev

Almost every data center needs to test operating system updates and new code releases. A DRaaS solution can meet the need. The problem is these testing needs require a copy of the server being tested with a most recent copy

Tagged with: , , , , , , , ,
Posted in Blog

What’s Next in Enterprise Backup Appliances? INFINIDAT Backup Appliance Briefing Note

Backup Appliances come in two forms. Integrated appliances that have the backup software pre-installed on them and appliances that act as stand-alone systems so they can accept input from a variety of backup sources. The second type is probably more

Tagged with: , , , , , , , , ,
Posted in Briefing Note

No Room in the Data Center – Secondary Storage Needs Cloud Integration – Cohesity Briefing Note

Most data growth in the enterprise is happening because of secondary storage use cases like backup, archive, and data re-use for test/dev or analytics (also known as copy data). In most cases, the capacity of secondary data is 10 to

Tagged with: , , , , , , , ,
Posted in Briefing Note

Protecting MongoDB, Cassandra, Hadoop – Datos IO Briefing Note

Data center modernization usually includes the organization moving to modern cloud applications like MongoDB, Cassandra and Hadoop. Like most new initiatives a forgotten element is data protection. These environments are particularly challenging to protect because they are designed to run

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note