Blog Archives

Multi-Cloud versus the Five Requirements of Data – Datrium Briefing Note

Organizations need to meet five core requirements of the data they store; encryption, mobility, performance, retention and disaster recovery. To deliver these elements, IT is often forced to use five or more products just for on-premises data, let alone the

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Key Security Features to Evaluate in Your Cloud Provider

Cloud storage services have evolved significantly in terms of their ability to provide data security, as well as their ability to comply with data privacy regulations such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

How Ransomware and GDPR Break Image Based Backups and How to Fix It

Image based backups, after the initial backup is complete, only backup change blocks within the item they are protecting. The technology enables organizations to frequently backup critical servers and applications. It also enables the protection of file servers with millions

Tagged with: , , , , , , ,
Posted in Briefing Note

StorMagic Encryption Key Manager and KVM Support Briefing Note

Cutting the Encryption and Hypervisor Taxes for the Edge and Small Data Centers Edge data centers are quickly becoming important hubs where mission-critical data is processed. Hyperconverged infrastructure (HCI) poses an attractive architecture to serve these environments, but there are

Tagged with: , , , , , ,
Posted in Briefing Note

Is Your Application Performance Too Slow? Consider Computational Storage

The modern workload set has fundamentally changed the nature of and also how we handle data sets. Previously, critical business applications were typically driven by the processing of large, monolithic databases that were comprised of large files. Today, more and

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

New eBook: Taking The Load off Networks with Computational Storage

The data center is a series of networks. There are networks that connect servers to users and networks that connect storage to servers. Even within servers and storage there are networks to connect CPU to IO devices like flash drives

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Is Enterprise File Sync and Share the Same as Data Protection?

Enterprise file sync and share (EFSS) services enable files that are stored either in an on-premises storage array or a cloud service, to be shared among multiple users and accessed by remote endpoint devices or desktops. Enterprise-grade EFSS services designed

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

Cloud Endpoint Protection: Potential Pitfalls to Avoid

Backing up endpoint data is no longer a nice-to-have. Leaving endpoints unprotected leaves critical enterprise data vulnerable to malware, deletion, theft or corruption, and to running afoul of data privacy regulations. This can quickly result in a tarnished brand reputation,

Tagged with: , , , , , , , , , ,
Posted in Blog

Solving the New Storage Performance Problem

NVMe (Non-Volatile Memory Express) flash drives thrust storage media from the position of the worst performing component of the data center to the best. The technology’s low latency however, exposes other bottlenecks that went previously undetected. The new storage performance

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Moving on From Mozy Endpoint

Protecting laptops, tablets, and smartphones (endpoints) are more critical than ever. Users use endpoints of all types to create data essential to the organization, but the user may never store that data on a corporate (and protected) fileserver. One of

Tagged with: , , , , , , , , , , , , , ,
Posted in Article

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 22,247 other followers

Blog Stats
  • 1,579,751 views