Blog Archives

Does Microsoft Office 365 Need to be Protected?

It is increasingly common for enterprises to offload mission-critical applications such as Microsoft Exchange to cloud service providers; in fact, Microsoft’s software-as-a-service (SaaS)-delivered Office 365 revenue has surpassed its conventional Office revenue since the fourth quarter of 2017, pointing to

Tagged with: , , , , , , , , , ,
Posted in Blog

Video: Utilizing Tape Storage as a Malware Failsafe

In today’s information era, data growth is booming. Furthermore, organizations are storing and backing up this data more than ever before to meet compliance regulations, as well as to increase the volume of information available for business analytics. At the

Tagged with: , , , , , , ,
Posted in Video

Fifteen Minute Friday: Do You Need to Protect Laptops, Office 365 and Salesforce.com?

Most enterprises don’t need convincing to back up their Oracle, MS-SQL, and VMware environments but for some reason, vendors struggle convincing most IT professionals that laptops, Office 365 and Salesforce.com also need backing up. The common misconception is that since

Tagged with: , , , , , , , , ,
Posted in Webinar

How Holistic Can a Backup Solution Become?

In a recent webinar, “Holistic Disaster Recovery; from Data Center to Endpoint”, Storage Switzerland discussed the concept of end-to-end (or holistic) disaster recovery. One of the questions asked was “How holistic can a backup solution become?” Which, considering that most

Tagged with: , , , , , , , , , , , ,
Posted in Blog

StorageShort: The Changing Face of Disasters

When it comes to disaster recovery planning, we tend to focus on grand scale events that impact entire regions of a country. The reality is though that most disasters are smaller in scale. These smaller disasters have a similar severity

Tagged with: , , , , , , , , , ,
Posted in StorageShort

Solving The Challenge with Endpoint Data Strategies

Applying data center data management best practices to endpoints is particularly challenging. As discussed in our prior post, there is the physical challenge that most organizations have hundreds if not thousands of endpoints and those endpoints are mobile. Managing and

Tagged with: , , , , , , , , , , , , ,
Posted in Article

Endpoints – From Laptop Backup to Total Data Management

Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical

Tagged with: , , , , , , , , , , , , ,
Posted in Article

SlideShare – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Slideshare

Bored with Ransomware? Good it is Not the Primary Problem

There has been a lot, too much maybe, discussion about ransomware and its impact on business. Ransomware is a threat but it is only one of the reasons organizations should protect user endpoints and servers. In a recent Storage Switzerland

Tagged with: , , , , , , , , ,
Posted in Blog

An Endpoint Strategy is More Than a Backup Strategy

Endpoints are a growing concern for enterprises, more employees have them (most have two or three), users store more data on them than ever (30% of that data is unique) and the data on these endpoints are within the scope

Tagged with: , , , , , , , , ,
Posted in Blog