Blog Archives

The Changing Scope of Disaster Recovery

Disaster Recovery, for most organizations, used to mean making sure that a handful of mission-critical applications were protected and able to be brought back online in the event of a data center failure. The data center of today has changed

Tagged with: , , , , , , , , , , ,
Posted in Blog

Webinar – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Webinar

Backup Endpoints So You Can Wipe Them

One of the best reasons to backup endpoints like laptops, tablets and smartphones has nothing to do with restores, it has to do with deletion. Endpoints are the most vulnerable to theft. They are left in airport security lines, Starbucks

Tagged with: , , , , , , ,
Posted in Blog

SlideShare: Using the Cloud to Fix Backup’s Blind Spot – Endpoint Data Protection

Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on

Tagged with: , , , , , , ,
Posted in Slideshare

Webinar: Holistic Disaster Recovery; from Data Center to Endpoint

Most disaster recovery strategies focus exclusively on the data center but most users use laptops and other endpoints to get their work done. And those endpoints often have unique, business critical data on them. Data center servers and storage as

Tagged with: , , , , , , , , , ,
Posted in Webinar

Webinar: Using the Cloud to Fix Backup’s Blind Spot – Endpoint Data Protection

Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on

Tagged with: , , , , , , ,
Posted in Webinar

Why Do Ransomware Victims Pay?

If ransomware gets through an organization’s defenses, they have two choices. Recover or pay. Given the growth in the number of ransomware attacks, many organizations choose to pay, which only further fuels the industry making the next round of ransomware

Tagged with: , , , , , , ,
Posted in Blog

Are You Ready for Ransomware’s Next Phase?

Ransomware has been a thorn in the side of IT professionals for over five years. What those professionals have seen so far though is just the tip of the iceberg. At the same time that IT is improving its response

Tagged with: , , , , , , ,
Posted in Blog

SlideShare: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?

Believe it or not, it has been a year since WannaCry crippled organizations around the world, and since that time ransomware attacks have only accelerated. The ransomware “industry” is now a $5 billion market and is projected to grow to

Tagged with: , , , , , , ,
Posted in Slideshare

Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?

Believe it or not, it has been a year since WannaCry crippled organizations around the world, and since that time ransomware attacks have only accelerated. The ransomware “industry” is now a $5 billion market and is projected to grow to

Tagged with: , , , , , , ,
Posted in Webinar