Blog Archives

Breaking Backup with SaaS

Backup is the one process that almost everyone in IT would opt out of if given the choice. In addition to the IT management burden there is often the burden of the infrastructure itself, a never ending need for more

Tagged with: , , , , , , , , , , , , , , , , ,
Posted in Blog

How to Avoid Cloud Pitfalls to Obtain an Infrastructure-Less Backup Strategy

Meeting requirements for infinite data retention and always-on business continuity is, practically speaking, not possible without using cloud resources in some way. On-premises backup and disaster recovery infrastructures are fraught with unpredictable costs and heavy operational overhead. At the same

Tagged with: , , , , , , , , , , , , , , , , ,
Posted in Blog

What the Enterprise Needs in SaaS Data Protection

Secondary storage is quickly consuming the data center and becoming too complex to manage. The copy data stored on those secondary systems is distributed across multiple enterprise and cloud storage locations. The secondary data set is being used for a

Tagged with: , , , , , , , , , , , , , , , , ,
Posted in Blog

You Will be Breached – What’s Next for Recoverability?

As ransomware variants grow in number and sophistication, it is practically inevitable that enterprises will be breached. Users are becoming more aware, but eventually there will be some users in the enterprise that click on something they shouldn’t. At the

Tagged with: , , , , , , , , , ,
Posted in Blog

MeetTheCEO: Quantum’s Jamie Lerner

Video and digital content is quickly growing to comprise a majority of the world’s data. Media and entertainment companies in particular are ingesting videos at the fastest streaming performance, sharing high-resolution content in real time, and protecting and preserving these

Tagged with: , , , , , , , , ,
Posted in Webinar

Overcoming Shortcomings of SaaS Based Data Protection

Most organizations don’t make money off their data protection process; instead they view it as an insurance policy in case something goes wrong. These organizations, however, do make sporadic investments in the data protection infrastructure and these investments consume a

Tagged with: , , , , , , , , , , ,
Posted in Blog

Three Key Steps to Endpoint Protection

In a world where data is only becoming more critical to the business, many enterprises look over the fact that endpoints are the weak link when it comes to data protection and availability. Data does not only live in the

Tagged with: , , , , , , , , , ,
Posted in Blog

The Problem with Converged Data Protection

When determining the true cost of your data protection infrastructure, a key factor is that infrastructure must be purchased upfront and in bulk, and requires significant management overhead. These costs can quickly break the bank in a world where more

Tagged with: , , , , , , , ,
Posted in Blog

The True Cost of Data Protection Infrastructure

Data protection is essential but expensive. The primary source of data protection expense is the required significant investment in the physical infrastructure. However, the cost of the physical infrastructure is much more than how much the organization spends on storage

Tagged with: , , , , , , , ,
Posted in Blog

SlideShare: How to Create an Infrastructure-less Backup Strategy

Designing architectures to backup primary storage as well as provide rapid recoveries is a challenging task that most IT professionals need to face. It is even more challenging in the face of a rapidly growing data set, increasing demand for

Tagged with: , , , , , , , ,
Posted in Slideshare