Blog Archives

The Problem with Gold-Only Data Protection Service Levels

A recent Storage Switzerland webinar dealt with the impact of the massive increase in the number of applications that data centers support on the data protection architecture. How does IT apply the right level of protection, set service levels, for

Tagged with: , , , , , , , , , ,
Posted in Blog

SlideShare: Application Explosion – Rediscovering the Lost Art of Protection Service Levels

The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the

Tagged with: , , , , , , , , , ,
Posted in Slideshare

Can Your Service Levels Keep Up With the Application Explosion?

The method that IT uses to protect applications is changing. Gone are the days of three or four mission critical applications. Today the backup team at most data centers needs to concern itself with protecting dozens if not hundreds of

Tagged with: , , , , , , , , , ,
Posted in Blog

The Impact of Application Sprawl on Protection Service Levels

In our upcoming webinar “Application Explosion – Rediscovering the Lost Art of Service Levels” we will discuss how IT can successfully continue to set service levels in environments where the number of applications they need to support is growing every

Tagged with: , , , , , , , , , ,
Posted in Blog

Webinar: Application Explosion – Rediscovering the Lost Art of Protection Service Levels

The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the

Tagged with: , , , , , , , , , ,
Posted in Webinar

SlideShare: Backup vs. Ransomware – 5 Requirements for Backup Success

Ransomware is the universal threat. No matter an organization’s data center location, or its size, it can be devastated by a ransomware attack. While most organizations focus on the periphery, they also need to be prepared for a breach, something

Tagged with: , , , , , , ,
Posted in Slideshare

What to do if Ransomware Strikes a Physical System

With ransomware, unlike almost any other form of disaster, there is an alternative to recovering from backups…pay the ransom. While one can argue the risk associated with paying a ransom, the organization may see it as a viable option. IT

Tagged with: , , , , , , , ,
Posted in Blog

Ransomware Changes Backup Software

The threat of ransomware has put IT on its toes. The pressure is on to backup everything more frequently and to make sure that recoveries happen faster than a BitCoin transaction. Backup software manufacturers need to up their capabilities too.

Tagged with: , , , , , , ,
Posted in Article

Securing Backups from Ransomware

Ransomware “developers” know that organizations are likely to count on their backups as a primary point of recovery if they are infected. As a result, these malware programs attempt to encrypt or disrupt backup operations. Other cyber attacks may even

Tagged with: , , , , , , , , , ,
Posted in Blog

Webinar: Backup vs. Ransomware – 5 Requirements for Backup Success

Ransomware is the universal threat. No matter an organization’s data center location, or its size, it can be devastated by a ransomware attack. While most organizations focus on the periphery, they also need to be prepared for a breach, something

Tagged with: , , , , , , ,
Posted in Webinar