Blog Archives

Solving The Challenge with Endpoint Data Strategies

Applying data center data management best practices to endpoints is particularly challenging. As discussed in our prior post, there is the physical challenge that most organizations have hundreds if not thousands of endpoints and those endpoints are mobile. Managing and

Tagged with: , , , , , , , , , , , , ,
Posted in Article

How to Backup Office 365

The case for protecting Office 365 is undeniable. First, Microsoft’s license agreement makes it very clear that the data stored on its service is the user’s and it is the user’s responsibility to protect it. Second, it makes sense to

Tagged with: , , , , , , , ,
Posted in Article

Endpoints – From Laptop Backup to Total Data Management

Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical

Tagged with: , , , , , , , , , , , , ,
Posted in Article

An Endpoint Strategy is More Than a Backup Strategy

Endpoints are a growing concern for enterprises, more employees have them (most have two or three), users store more data on them than ever (30% of that data is unique) and the data on these endpoints are within the scope

Tagged with: , , , , , , , , ,
Posted in Blog

The Changing Scope of Disaster Recovery

Disaster Recovery, for most organizations, used to mean making sure that a handful of mission-critical applications were protected and able to be brought back online in the event of a data center failure. The data center of today has changed

Tagged with: , , , , , , , , , , ,
Posted in Blog

Webinar: Holistic Disaster Recovery; from Data Center to Endpoint

Most disaster recovery strategies focus exclusively on the data center but most users use laptops and other endpoints to get their work done. And those endpoints often have unique, business critical data on them. Data center servers and storage as

Tagged with: , , , , , , , , , ,
Posted in Webinar

Office 365 Delete Items Folder – Isn’t 24,855 days enough?

A question that came up on our on demand webinar “Next Question: How to protect Office 365” was “Can’t I just use the Deleted Items Folder?” The deleted items folder does help prevent some data loss. Microsoft Office 365 allows

Tagged with: , , , , , , , ,
Posted in Blog

Decisions the Enterprise Must Make When Considering Cloud Backup

In our first column we discussed what cloud providers needed to provide to make the enterprise more comfortable with using the cloud for backup. In this entry we discuss how to choose the right cloud provider and give an example

Tagged with: , , , , , , , , , , ,
Posted in Blog

The First Step in Cloud DR is Cloud Backup

“It’s not about backup, it’s about recovery” is a common statement from the marketing departments of backup software suppliers. A recovery can’t be performed without a quality copy of the data. Cloud storage’s low cost and automatic off-site capabilities as

Tagged with: , , , , , , , , , ,
Posted in Blog

Why Cloud Backup Doesn’t Work for Enterprises and How to Fix it

Protecting the enterprise remains a big challenge facing data centers. Backup touches and interacts with almost every component of the data center, and in the enterprise where there are more of those components; the chance for failure is high. At

Tagged with: , , , , , , , ,
Posted in Blog