Blog Archives

GDPR is for Everyone – Why All Businesses Need A Data Privacy Policy

Many IT Planners look at the European Union’s (EU) General Data Protection Regulation (GDPR) as a distinctly European problem. The reality is the GDPR and regulations like it, impact businesses around the world. GDPR impacts any business that does business

Tagged with: , , , , , , , ,
Posted in Blog

Webinar: Data Management vs. GDPR and Data Privacy – How to Solve the Right to Be Forgotten Problem

The General Data Protection Regulation (GDPR) makes specific demands on organizations based in and doing business in the European Union (EU). Now several US states are considering similar legislation and California has already passed a GDPR-like law. Clearly this is

Tagged with: , , , , , ,
Posted in Webinar

Designing an All-Flash Data Management Strategy

Thanks to decreasing flash media pricing and data efficiency technologies like deduplication, all-flash arrays are now commonplace in many data centers. In most cases though, the purchases of first generation all-flash arrays were to solve a specific performance problem. Now

Tagged with: , , , , , , , , , ,
Posted in Article

ChalkTalk Video: Ransomware Attacks Backups

Is 3-2-1 for Backup Enough to Protect Against Ransomware? Because many organizations continue to pay ransoms to unlock their data, ransomware continues to become more sophisticated. The malware now attacks backup applications themselves and is infiltrating backup data. In this

Tagged with: , , , , , , , , ,
Posted in Video

Object Storage or NAS for File Sync and Share

The primary motivation behind using file sync and share used to be the “sync” component. Now, however, it is sharing. In an era where devices are almost always connected to the internet, syncing is less of a priority, although ubiquitous

Tagged with: , , , , , , , , , , ,
Posted in Blog

SlideShare: How to Create a Disaster Recovery (DR) Plan that Actually Works

Disaster Recovery plans have always been hard to create and maintain in part because it is difficult to meet the service levels that those plans promise. With recent trends like GDPR and ransomware threats, it is even more difficult for

Tagged with: , , , , , , , , , ,
Posted in Slideshare

Refining Your GDPR Strategy – Addressing User Data

The European Union’s General Data Protection Regulation (GDPR) deadline for implementation has come and gone. Many organizations have achieved a basic level of compliance, so now is the time to dig deeper, tie up loose ends and try to simplify

Tagged with: , , , , , , , , , , ,
Posted in Blog

Are Snapshots Enough to Protect Unstructured Data?

Unstructured data is hard to protect. It is growing at alarming rates. It is a crucial target of cyber-threats like ransomware. Even the makeup of the data is problematic. Unstructured data is often made up of millions, and in some

Tagged with: , , , , , ,
Posted in Blog

The Problem with Using Cloud Storage for Long-Term Data Retention – Nexsan Briefing Note

Compared to on-premises archive storage the cloud seems like an ideal place to archive data. An organization can start small, grow incrementally and only pay for the storage they are using. There is a crossover point however where it is

Tagged with: , , , , , , , ,
Posted in Briefing Note

What are Ransomware Attack Loops and How to Prevent Them – Asigra Briefing Note

Ransomware is the “new” disaster with which every data center, regardless of location, needs to be concerned. IT must take steps to protect the organization’s data, and even its brand from ransomware. A successful defense against ransomware requires user training

Tagged with: , , , , , , , ,
Posted in Briefing Note