Blog Archives

Fifteen Minute Friday: Do You Need to Protect Laptops, Office 365 and Salesforce.com?

Most enterprises don’t need convincing to back up their Oracle, MS-SQL, and VMware environments but for some reason, vendors struggle convincing most IT professionals that laptops, Office 365 and Salesforce.com also need backing up. The common misconception is that since

Tagged with: , , , , , , , , ,
Posted in Webinar

How to Shrink the Data Protection Investment

The data protection infrastructure seems to be on a never ending growth curve. The organization is constantly buying more storage and software licenses to support the process. The reality is though that there are opportunities to downsize the organization’s data

Tagged with: , , , , , , , , ,
Posted in Blog

Empowering Business Modernization with Consumption-based, Intelligent Disaster Recovery

Application development and delivery modernization, stricter IT service level agreements (SLAs) that come with increasing pressure from the business, and massive data growth have a ripple effect across the IT infrastructure market. For the storage market, these requirements mean that

Tagged with: , , , , , , , , , , , ,
Posted in Blog

SlideShare: Consumption Based Data Management Providing Peace of Mind

Consumption based IT is a curated set of IT solutions that focus on business outcomes. As the name implies it is purchased on a pay-as-you-go model. The goal of consumption based IT is to simplify establishing IT infrastructure that incorporates

Tagged with: , , , , , , , , ,
Posted in Slideshare

Understanding the Cost of Data Protection Infrastructure

Protecting primary storage is significantly more expensive than the actual cost of primary storage. While, in most cases, data protection storage doesn’t need to perform at the same level as primary storage, it does need to provide acceptable performance, and

Tagged with: , , , , , , , , ,
Posted in Blog

Have We Reached VMware Backup Parity?

There was a time not too long ago where the state of VMware backups was bad. It was so bad in fact that entirely new companies emerged to address the problem. These companies took the approach of ignoring the then

Tagged with: , , , , , , , , , ,
Posted in Blog

SlideShare – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Slideshare

Bored with Ransomware? Good it is Not the Primary Problem

There has been a lot, too much maybe, discussion about ransomware and its impact on business. Ransomware is a threat but it is only one of the reasons organizations should protect user endpoints and servers. In a recent Storage Switzerland

Tagged with: , , , , , , , , ,
Posted in Blog

What is Consumption Based Data Protection?

The data protection process has three key costs; the software that protects data; the hardware that drives that software and stores protected copies of data and the administration time required to manage the process. The upfront costs are a challenge

Tagged with: , , , , , , , , ,
Posted in Blog

Webinar: Consumption Based Data Management Providing Peace of Mind

Consumption based IT is a curated set of IT solutions that focus on business outcomes. As the name implies it is purchased on a pay-as-you-go model. The goal of consumption based IT is to simplify establishing IT infrastructure that incorporates

Tagged with: , , , , , , , , ,
Posted in Webinar

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 22,024 other followers

Blog Stats
  • 1,392,144 views