Blog Archives

Ransomware: The Problem with Paying the Ransom

When ransomware hits an organization, it is very tempting simply to pay the ransom instead of going through the time and effort to replace the encrypted data by recovering from a backup. After paying the ransom, the hackers give a

Tagged with: , , , , , , , ,
Posted in Blog

Creating Enterprise Ready Global File Collaboration – Nasuni Briefing Note

There are several global file collaboration vendors on the market today. These solutions are designed to replace legacy network attached storage (NAS) systems. As the global file collaboration moniker implies, these systems allow the widespread distribution of files. The solutions

Tagged with: , , , , , , ,
Posted in Blog

Live Webinar: Flash to Flash to Cloud – Three Steps to Ending the Storage Nightmare

Three primary storage challenges that keep IT up at night: How to keep up with application performance demand How to affordably manage and store the vast amount of data that IT has to store How to protect that data so

Tagged with: , , , , , , ,
Posted in Webinar

SlideShare: Amazon RE:Invent for Storage Professionals – Three Capabilities to Look For

This was the sixth year of Amazon RE:Invent. In this webinar listen to Storage Switzerland, Avere Systems and SwiftStack for a storage professional’s guide to the event. Learn about: The different tiers of the Amazon storage offering How to create

Tagged with: , , , , , , , ,
Posted in Slideshare

How Concerned Should US Data Centers Be About GDPR?

The European Union’s General Data Protection Regulation (GDPR) is set to go in effect in a matter of months, yet according to a SpiceWorks Survey, only 9% of US IT professionals feel they have a good understanding of the regulation.

Tagged with: , , , , , , , ,
Posted in Blog

How to Backup Big NAS – Igneous Briefing Note

One of the top use cases for a network attached storage system (NAS) is to be the catchall for unstructured data to make it easy to distribute data to compute in a shared infrastructure for use by many applications. The

Tagged with: , , , , , ,
Posted in Briefing Note

Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018

And how to counter them Organizations are facing increasing businesses continuity and resiliency challenges in 2018. Much of these pressures – such as security threats, an increase in the number of mission critical applications, and data shifting to the cloud

Tagged with: , , , , , ,
Posted in Webinar