Blog Archives

What the Enterprise Needs in SaaS Data Protection

Secondary storage is quickly consuming the data center and becoming too complex to manage. The copy data stored on those secondary systems is distributed across multiple enterprise and cloud storage locations. The secondary data set is being used for a

Tagged with: , , , , , , , , , , , , , , , , ,
Posted in Blog

You Will be Breached – What’s Next for Recoverability?

As ransomware variants grow in number and sophistication, it is practically inevitable that enterprises will be breached. Users are becoming more aware, but eventually there will be some users in the enterprise that click on something they shouldn’t. At the

Tagged with: , , , , , , , , , ,
Posted in Blog

MeetTheCEO: Quantum’s Jamie Lerner

Video and digital content is quickly growing to comprise a majority of the world’s data. Media and entertainment companies in particular are ingesting videos at the fastest streaming performance, sharing high-resolution content in real time, and protecting and preserving these

Tagged with: , , , , , , , , ,
Posted in Webinar

Overcoming Shortcomings of SaaS Based Data Protection

Most organizations don’t make money off their data protection process; instead they view it as an insurance policy in case something goes wrong. These organizations, however, do make sporadic investments in the data protection infrastructure and these investments consume a

Tagged with: , , , , , , , , , , ,
Posted in Blog

Three Key Steps to Endpoint Protection

In a world where data is only becoming more critical to the business, many enterprises look over the fact that endpoints are the weak link when it comes to data protection and availability. Data does not only live in the

Tagged with: , , , , , , , , , ,
Posted in Blog

The Problem with Converged Data Protection

When determining the true cost of your data protection infrastructure, a key factor is that infrastructure must be purchased upfront and in bulk, and requires significant management overhead. These costs can quickly break the bank in a world where more

Tagged with: , , , , , , , ,
Posted in Blog

The True Cost of Data Protection Infrastructure

Data protection is essential but expensive. The primary source of data protection expense is the required significant investment in the physical infrastructure. However, the cost of the physical infrastructure is much more than how much the organization spends on storage

Tagged with: , , , , , , , ,
Posted in Blog

SlideShare: How to Create an Infrastructure-less Backup Strategy

Designing architectures to backup primary storage as well as provide rapid recoveries is a challenging task that most IT professionals need to face. It is even more challenging in the face of a rapidly growing data set, increasing demand for

Tagged with: , , , , , , , ,
Posted in Slideshare

The Impact of Changing Data Protection Requirements on Your Infrastructure

The new state of data protection, whereby enterprises must protect copy data quantities that are growing exponentially on a global basis with instant, up-to-the-minute recovery, places new demands on the secondary storage infrastructure. The key problem lies in the fact

Tagged with: , , , , , , , , , , ,
Posted in Blog

Veeam and HPE Consumption-Based Data Management

Consumption-based IT enables the customer to obtain the pay-as-you-go cost effectiveness of cloud services while retaining an on-premises footprint. It also dramatically simplifies IT infrastructure management and planning. Data protection administrators in particular can benefit from this method of acquiring

Tagged with: , , , , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 22,125 other followers

Blog Stats
  • 1,478,348 views