Blog Archives

SlideShare: How To Achieve Total File Security in the Cloud

Today’s IT professional is stuck in the middle of a file sharing tug of war. One side has the end users who want the improved productivity that mobility and collaboration promises. The other side consists of corporate governance that wants

Tagged with: , , , , ,
Posted in Slideshare

Enterprise File Sync and Share vs. A File Strategy

Users want their files available to them at all times, on any device and at any location. Organizations are scrambling to implement enterprise file sync and share products answer the demand before users go off and do it themselves with

Tagged with: , , , , , , ,
Posted in Blog

StorageShort: Will Enterprise File Sync and Share Encryption Really Protect You?

Ask any Enterprise File Sync and Share (EFSS) vendor if they provide encryption and you are going to get a emphatic, “Yes!” They will claim end-to-end encryption and let you assume that you are covered. But are you really? Certainly

Tagged with: , , , , , ,
Posted in StorageShort

Webinar: How To Achieve Total File Security in the Cloud

Today’s IT professional is stuck in the middle of a file sharing tug of war. One side has the end users who want the improved productivity that mobility and collaboration promises. The other side consists of corporate governance that wants

Tagged with: , , , , ,
Posted in Webinar

Do VMs need NAS and why?

Virtual machines (VMs) need file services as much as physical servers need them. Once file services expanded beyond user home directories, administrators started using them for the storage needs of many different types of applications. Besides sharing data between multiple

Tagged with: , , , , , , ,
Posted in Blog

Briefing Note: Imation focuses on locking down High-Value Data

There is a new data type that IT professionals need to be concerned with: high-value data. This is unstructured (file) data typically created by users, that has organizationally sensitive information in it and needs to be protected from tampering, loss

Tagged with: , , , , , ,
Posted in Briefing Note

Test Drive: Can Businesses replace Dropbox with Connected Data’s Transporter?

Dropbox is the poster child for Shadow IT, and for good reason. The solution is easy to use and, because it operates transparently, it’s just another folder. But Dropbox was originally designed to be a consumer tool, not a business

Tagged with: , , , , , , ,
Posted in Briefing Note

Analyst Blog: Cloud Storage is only as Risky as you make it

In a recent article our friends over at storagenewsletter.com asked an important question, “Is Cloud Storage Risky for Users?”. Our answer is that cloud storage is only as risky as you make it. In other words, an organization that’s planning

Tagged with: , , , , , ,
Posted in Blog

Briefing Note: CTERA’s Cloud Data Services Platform Transforms SMB and ROBO IT Service Delivery

New cloud technologies and their associated economics have created both opportunities and challenges as organizations wrestle with how to govern, optimize and automate the delivery of IT services. IT managers are seeking new ways to deliver these services from within

Tagged with: , , , , , , , , , , , , ,
Posted in Briefing Note

What is Hybrid Cloud Backup?

One of the key challenges to any data protection strategy is deciding where to store data and how to get that data off-site. Initially in most environments, all backups were stored on tape. Those tapes were then packaged up and

Tagged with: , , , , , , , , ,
Posted in Article