Blog Archives

Does The Cloud Need Backup?

There is no such thing as the cloud; there is only somebody else’s computer. Data stored in the cloud (i.e. on someone else’s computer) needs to be protected just like data stored on your own computer. No one would question

Tagged with: , , , , , ,
Posted in Blog

A Private Cloud That’s More Than A Backup Appliance – Cloudian Product Analysis

An organization’s backup storage target options have changed from simple tape to an almost bewildering number of options such as fully integrated backup appliances, secondary storage systems, cloud storage, object storage and various other software defined storage (SDS) systems. An

Tagged with: , , , , , , , , , , ,
Posted in Product Analysis

Webinar: The Showdown for Data Preservation: Iron Mountain vs. The Cloud

Join Storage Switzerland and CloudLanes for our on demand webinar as we compare Iron Mountain to the cloud and provide ways to solve the gaps in public cloud storage’s ability to be a viable data preservation service. Register today and

Tagged with: , , , , , , , , ,
Posted in Webinar

What is Open Converged Infrastructure?

Converged infrastructure (CI) and hyperconverged infrastructure (HCI) are common terms, but open converged infrastructure (OCI) is new. What is it and how is it different from the other architectures? This article will start with an examination of the similarities and

Tagged with: , , , , , , , , , , ,
Posted in Article

SlideShare: 15 Minute Ransomware Survival Guide

Ransomware is a new threat, and new threats require new strategies. Within the first 15 minutes this webinar will provide you key strategies for surviving a ransomware attack. During the event Storage Switzerland and Commvault cover the three P’s of

Tagged with: , , , , , , ,
Posted in Slideshare

How to Design Self-Service Storage – ioFABRIC Briefing Note

For application owners, storage is an overly complicated ordeal that they must go through in order to get applications up and performing well. Ideally, application owners should be masked from the complexity of the infrastructure. They shouldn’t care which storage

Tagged with: , , , , , , , , , , ,
Posted in Briefing Note

Ransomware Protection Requires Different Protocols

The core server component of most modern backup applications run on Windows. Unfortunately, Windows is also the primary target of ransomware attacks. While there are incidents of attacks on Linux or Macs, ransomware creators are going to go for the

Tagged with: , , , , , , , ,
Posted in Blog

New Threats Require Better DR – CloudEndure Briefing Note

Despite the rising concerns over cyber-attacks like ransomware, humans are still the number one cause of disasters. We need to look no further than the Amazon “typo error” of 2017 that knocked out service on AWS for proof. According to

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

How SMBs Can Have Enterprise Class DP without Breaking the Bank? – BackupAssist 10 Briefing Note

Small to medium sized businesses (SMBs) often lack a good backup and recovery strategy, and often do not realize the difference between archive and disaster recovery. They find quality data protection (DP), data retention and disaster recovery difficult to obtain

Tagged with: , , , , , , , , , , , , , , ,
Posted in Briefing Note

How to Prepare for the Next WannaCry

WannaCry was a wakeup call. New ransomware strains are now appearing every week because ransomware is a profitable “business.” There will be another attack and the chances of your organization being infected are high. The time is now to take

Tagged with: , , , , , , , ,
Posted in Blog