Blog Archives

Webinar: Is It Time to Upgrade Your Endpoint Data Strategy?

As organizations and their employees become more distributed, a case can be made that endpoints (laptops, tablets and smartphones) are some of the most critical pieces of technology in the organization. The problem is most organizations haven’t revisited their endpoint

Tagged with: , , , , , , , , , ,
Posted in Webinar

Creating an Endpoint Backup Strategy that Works for Everyone

Backing up endpoints is a crucial aspect of a comprehensive, modern data protection strategy. Laptops and mobile devices are the primary means through which employees read and modify corporate data. Despite the ongoing shift to software-as-a-service (SaaS), users commonly save

Tagged with: , , , , , , , , , ,
Posted in Blog

Does Microsoft Office 365 Need to be Protected?

It is increasingly common for enterprises to offload mission-critical applications such as Microsoft Exchange to cloud service providers; in fact, Microsoft’s software-as-a-service (SaaS)-delivered Office 365 revenue has surpassed its conventional Office revenue since the fourth quarter of 2017, pointing to

Tagged with: , , , , , , , , , ,
Posted in Blog

Video: Utilizing Tape Storage as a Malware Failsafe

In today’s information era, data growth is booming. Furthermore, organizations are storing and backing up this data more than ever before to meet compliance regulations, as well as to increase the volume of information available for business analytics. At the

Tagged with: , , , , , , ,
Posted in Video

Fifteen Minute Friday: Do You Need to Protect Laptops, Office 365 and Salesforce.com?

Most enterprises don’t need convincing to back up their Oracle, MS-SQL, and VMware environments but for some reason, vendors struggle convincing most IT professionals that laptops, Office 365 and Salesforce.com also need backing up. The common misconception is that since

Tagged with: , , , , , , , , ,
Posted in Webinar

How Holistic Can a Backup Solution Become?

In a recent webinar, “Holistic Disaster Recovery; from Data Center to Endpoint”, Storage Switzerland discussed the concept of end-to-end (or holistic) disaster recovery. One of the questions asked was “How holistic can a backup solution become?” Which, considering that most

Tagged with: , , , , , , , , , , , ,
Posted in Blog

StorageShort: The Changing Face of Disasters

When it comes to disaster recovery planning, we tend to focus on grand scale events that impact entire regions of a country. The reality is though that most disasters are smaller in scale. These smaller disasters have a similar severity

Tagged with: , , , , , , , , , ,
Posted in StorageShort

Solving The Challenge with Endpoint Data Strategies

Applying data center data management best practices to endpoints is particularly challenging. As discussed in our prior post, there is the physical challenge that most organizations have hundreds if not thousands of endpoints and those endpoints are mobile. Managing and

Tagged with: , , , , , , , , , , , , ,
Posted in Article

Endpoints – From Laptop Backup to Total Data Management

Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical

Tagged with: , , , , , , , , , , , , ,
Posted in Article

SlideShare – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Slideshare