Blog Archives

SlideShare: Backup vs. Ransomware – 5 Requirements for Backup Success

Ransomware is the universal threat. No matter an organization’s data center location, or its size, it can be devastated by a ransomware attack. While most organizations focus on the periphery, they also need to be prepared for a breach, something

Tagged with: , , , , , , ,
Posted in Slideshare

What to do if Ransomware Strikes a Physical System

With ransomware, unlike almost any other form of disaster, there is an alternative to recovering from backups…pay the ransom. While one can argue the risk associated with paying a ransom, the organization may see it as a viable option. IT

Tagged with: , , , , , , , ,
Posted in Blog

The Challenges of After-The-Fact Encryption

Encryption is a foundational component of a cyber-secure storage system. The problem is that most organizations implement encryption after-the-fact, months if not years after the initial implementation. When IT is considering a new storage system, they tend to focus on

Tagged with: , , , , , , , ,
Posted in Blog

ChalkTalk Video: Managing Secondary Data Globally

Secondary data continues to grow at an unprecedented pace and organizations are increasingly using that data for purposes beyond backup and archive. IT needs a way to visualize, manage and take action on their secondary data and applications. Organizations also

Tagged with: , , , , , , , , ,
Posted in Video

ChalkTalk Video: Computational Storage With In-Situ Processing

What is Computational Storage? It only takes a few NVMe flash drives to saturate a server’s PCIe Bus. Network those NVMe flash drives and the situation only gets worse. Computational Storage solves the problem by placing compute capabilities directly on

Tagged with: , , , , , , , ,
Posted in Video

ChalkTalk Video: Ransomware Attacks Backups

Is 3-2-1 for Backup Enough to Protect Against Ransomware? Because many organizations continue to pay ransoms to unlock their data, ransomware continues to become more sophisticated. The malware now attacks backup applications themselves and is infiltrating backup data. In this

Tagged with: , , , , , , , , ,
Posted in Video

Object Storage or NAS for File Sync and Share

The primary motivation behind using file sync and share used to be the “sync” component. Now, however, it is sharing. In an era where devices are almost always connected to the internet, syncing is less of a priority, although ubiquitous

Tagged with: , , , , , , , , , , ,
Posted in Blog

What Happens When You Push the DRaaS Button?

In case of a disaster, a traditional cloud backup application needs to transfer all data across limited internet bandwidth and back to the data center or the new location. The bandwidth restrictions make cloud recovery a time consuming process that

Tagged with: , , , , , , , , ,
Posted in Blog

Demo: Disaster Recovery as a Service in Action

By leveraging the cloud, Disaster Recovery as a Service (DRaaS) eliminates many of the costs associated with a DR site, changing it from a capital cost to an operational cost. Does DRaaS sound too good to be true? Can organizations

Tagged with: , , , , , , , ,
Posted in Webinar

Webinar: The Next Question: How to Backup Office 365

The first Office 365 question is, do organizations need to protect their data stored there? The answer is yes, Office 365 data needs protection. Almost every industry expert recommends that organizations take Office 365 protection into their own hands and

Tagged with: , , , , , , , ,
Posted in Webinar