Blog Archives

What Constitutes a Complete Data Protection Platform?

Endpoint protection has frequently been treated as an expensive hassle that is not worth it. However, for a number of reasons, organizations can no longer risk leaving employees’ laptops, tablets and other devices unprotected. The major concern is that data

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

StorCentric Acquires Retrospect – Comprehensive Primary through Secondary Storage Capabilities

The lines between primary and secondary storage infrastructures are blurring. Today’s typical backup and disaster recovery workloads require faster performance while production workloads demand growing amounts of capacity. IT requires as consolidated a storage infrastructure as possible for simplicity. At

Tagged with: , , , , , , , , , , , , , ,
Posted in Briefing Note

Key Security Features to Evaluate in Your Cloud Provider

Cloud storage services have evolved significantly in terms of their ability to provide data security, as well as their ability to comply with data privacy regulations such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

Data Management vs Data Protection

Storing data comes with responsibilities, two of which are managing that data and protecting it. Many organizations however, focus most of their attention on protecting the data and almost no attention to managing it. However, focusing attention solely on data

Tagged with: , , , , , , , , , , , ,
Posted in Blog

How are the Benefits and Challenges of the Cloud Evolving?

As the cloud continues to mature, organizations are also increasing their sophistication in terms of how they leverage the cloud. A survey by Osterman Research corroborates what Storage Switzerland is hearing from end users – where previously the cloud was

Tagged with: , , , , , , , , , , , ,
Posted in Blog

MeetTheCEO: Actifio’s Ash Ashutosh

Enterprises are dealing with a constant tide of copy data sprawl. More copies are being created to serve secondary business processes like analytics, test and development, and frequently with limited oversight or governance from IT. Meanwhile, regulations like the European

Tagged with: , , , , , , , , ,
Posted in Webinar

Is Enterprise File Sync and Share the Same as Data Protection?

Enterprise file sync and share (EFSS) services enable files that are stored either in an on-premises storage array or a cloud service, to be shared among multiple users and accessed by remote endpoint devices or desktops. Enterprise-grade EFSS services designed

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

What is the Best Way to Store Inactive Data?

In today’s data deluge, it is a challenge for IT professionals to get a comprehensive and confident grasp on all of the data that their organization is storing – never mind how that data is actually being used. The reality

Tagged with: , , , , , , , , , , , ,
Posted in Blog

How to Make Data Archiving Easier Than Expanding Primary Storage

Most IT professionals will admit that most of their data is inactive and hasn’t been accessed in years. Storage Switzerland finds that over 80% of the data in most data centers falls into this category. There are viable solutions to

Tagged with: , , , , , , , , , , , ,
Posted in Blog

What is Data Center Transformation?

“IT transformation” is among the most commonly-used (and arguably the most over-used) term in the industry today, but no matter how you define it, one thing is clear: almost universally, enterprises are revamping their IT infrastructure to better meet modern

Tagged with: , , , , , , , , , , , ,
Posted in Blog