Blog Archives

Webinar: Holistic Disaster Recovery; from Data Center to Endpoint

Most disaster recovery strategies focus exclusively on the data center but most users use laptops and other endpoints to get their work done. And those endpoints often have unique, business critical data on them. Data center servers and storage as

Tagged with: , , , , , , , , , ,
Posted in Webinar

Object Storage or Cloud for Enterprise File Sync and Share

Enterprise File Sync and Share (EFSS) is a “must deliver” for IT since most users perceive the capability to be a “must have”. In our last blog we discussed what to look for in an EFSS and explained the advantages

Tagged with: , , , , , , , , , , ,
Posted in Blog

Office 365 Delete Items Folder – Isn’t 24,855 days enough?

A question that came up on our on demand webinar “Next Question: How to protect Office 365” was “Can’t I just use the Deleted Items Folder?” The deleted items folder does help prevent some data loss. Microsoft Office 365 allows

Tagged with: , , , , , , , ,
Posted in Blog

Office 365 Backup Without Lock-in – BackupAssist 365 Briefing Note

The popularity of Office 365 continues to increase. Organizations large and small are adopting the service for office productivity and communications. Office 365 provides excellent service availability. If a server or storage system within the service fails within the service,

Tagged with: , , , , , , , , ,
Posted in Briefing Note

SlideShare: Five Things to Look for in Your Next All-Flash Array

The first generation of all-flash arrays has come and gone. For many organizations, the time is now to consider the “next” all-flash array. In our on demand webinar, Storage Switzerland and X-IO Storage discuss five things to look for in

Tagged with: , , , , , , , , , ,
Posted in Slideshare

Storage Consolidation Requires Cloud Archive

Managing one of something is usually easier than managing five of something. Indeed, when it comes to storage systems, it is easy to manage one vast storage array than it is five to ten individual ones. Consolidated systems focus much

Tagged with: , , , , , , ,
Posted in Blog

The Evolution of Ransomware – Is Backup Safe?

When ransomware first appeared in data centers, it had a simple attack pattern. Once it landed inside the data center, the malware tried to encrypt every file as fast as possible. If IT didn’t have good backups, the organization was

Tagged with: , , , , , , , ,
Posted in Blog

Decisions the Enterprise Must Make When Considering Cloud Backup

In our first column we discussed what cloud providers needed to provide to make the enterprise more comfortable with using the cloud for backup. In this entry we discuss how to choose the right cloud provider and give an example

Tagged with: , , , , , , , , , , ,
Posted in Blog

Software Defining Secondary Storage – Quest QoreStor Briefing Note

Secondary storage systems primarily store backup and archive data. These systems often store ten to twenty times the capacity of primary storage systems. Vendors realize the opportunity and are now flooding into the market. Most of the solutions are turnkey

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

A Step-by-Step Path to Full Cloud Utilization

The Use Cases for a Cloud Data Fabric The cloud data fabric (CDF) allows organizations without a cloud pedigree to take full advantage of cloud storage and compute resources. The CDF also enables the organization to move to the cloud

Tagged with: , , , , , , , , , , , ,
Posted in Blog