Blog Archives

Protecting Your Data Protection’s Blind Side – Endpoints

Laptops, smartphones, and tablets are how users get work done. A surprising amount of organizational data is stored exclusively on laptops, never touching data center storage. Endpoints are also on the front lines of business where they are the most

Tagged with: , , , , , , , ,
Posted in Blog

The Changing Scope of Disaster Recovery

Disaster Recovery, for most organizations, used to mean making sure that a handful of mission-critical applications were protected and able to be brought back online in the event of a data center failure. The data center of today has changed

Tagged with: , , , , , , , , , , ,
Posted in Blog

How to Prevent Data Leaks in a Collaborative World – MyWorkDrive Version 5 Briefing Note

Collaboration and Data Leak Prevention (DLP) seem to be at odds with each other. Collaboration requires sharing data and it seems like copying that data to a sharing service is the only viable alternative. The only way IT can protect

Tagged with: , , , , , , , ,
Posted in Briefing Note

What Ever Happened to the Software Defined Data Center?

About a decade ago, VMware introduced the vision of a software-defined data center (SDDC). Unlike data centers of yesteryear, a software-defined data center was supposed to leverage intelligent software and commodity hardware to create a flexible data center that could

Tagged with: , , , , , , , , , , , ,
Posted in Article

eBook: Developing a Holistic Storage Security Strategy

The target of most cyber-attacks, like ransomware, is eventually the primary storage system that stores the organization’s most valuable data. If an attacker compromises the organization’s data, they either attempt to restore the data from backups or pay a ransom

Tagged with: , , , , , , , ,
Posted in Blog

How to Create a Secure End-to-End Storage Infrastructure

Security breaches are a constant threat to organizations, and while securing primary storage is a top priority another challenge is making sure data is secure as various processes copy it. Organizations copy data for many legitimate reasons; backup, test-dev, and

Tagged with: , , , , , , ,
Posted in Blog

Webinar: Application Explosion – Rediscovering the Lost Art of Protection Service Levels

The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the

Tagged with: , , , , , , , , , ,
Posted in Webinar

Backup Endpoints So You Can Wipe Them

One of the best reasons to backup endpoints like laptops, tablets and smartphones has nothing to do with restores, it has to do with deletion. Endpoints are the most vulnerable to theft. They are left in airport security lines, Starbucks

Tagged with: , , , , , , ,
Posted in Blog

Trusting and Testing DRaaS

Many organizations count on a Disaster Recovery as a Service (DRaaS) solution to enable them to bounce back quickly if a disaster strikes their primary data center. DRaaS saves organizations the expenses associated with investing in and equipping a disaster

Tagged with: , , , , , , , ,
Posted in Blog

SlideShare: Using the Cloud to Fix Backup’s Blind Spot – Endpoint Data Protection

Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on

Tagged with: , , , , , , ,
Posted in Slideshare