Blog Archives

Solving The Challenge with Endpoint Data Strategies

Applying data center data management best practices to endpoints is particularly challenging. As discussed in our prior post, there is the physical challenge that most organizations have hundreds if not thousands of endpoints and those endpoints are mobile. Managing and

Tagged with: , , , , , , , , , , , , ,
Posted in Article

Endpoints – From Laptop Backup to Total Data Management

Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical

Tagged with: , , , , , , , , , , , , ,
Posted in Article

Object Storage or Cloud for Enterprise File Sync and Share

Enterprise File Sync and Share (EFSS) is a “must deliver” for IT since most users perceive the capability to be a “must have”. In our last blog we discussed what to look for in an EFSS and explained the advantages

Tagged with: , , , , , , , , , , ,
Posted in Blog

The Evolution of Ransomware – Is Backup Safe?

When ransomware first appeared in data centers, it had a simple attack pattern. Once it landed inside the data center, the malware tried to encrypt every file as fast as possible. If IT didn’t have good backups, the organization was

Tagged with: , , , , , , , ,
Posted in Blog

Do You Need to Backup Office 365?

Office 365 lives in Microsoft’s Azure cloud service. That service consists of more than one location and certainly more than one server. Microsoft does an excellent job of keeping the service available, and to most users, it feels like it

Tagged with: , , , , , , , , , , ,
Posted in Blog

ChalkTalk Video: Ransomware Attacks Backups

Is 3-2-1 for Backup Enough to Protect Against Ransomware? Because many organizations continue to pay ransoms to unlock their data, ransomware continues to become more sophisticated. The malware now attacks backup applications themselves and is infiltrating backup data. In this

Tagged with: , , , , , , , , ,
Posted in Video

SlideShare: How to Design a Compliant and GDPR Ready Collaboration System

Users need to collaborate on projects, which means sharing file data with other internal users as well as external business partners. More often than not, to accomplish this file sharing, they leverage cloud-based file-sync and share solutions. The problem is

Tagged with: , , , , , , , ,
Posted in Slideshare

Refining Your GDPR Strategy – Addressing User Data

The European Union’s General Data Protection Regulation (GDPR) deadline for implementation has come and gone. Many organizations have achieved a basic level of compliance, so now is the time to dig deeper, tie up loose ends and try to simplify

Tagged with: , , , , , , , , , , ,
Posted in Blog

Webinar: How to Design a Compliant and GDPR Ready Collaboration System

Users need to collaborate on projects, which means sharing file data with other internal users as well as external business partners. More often than not, to accomplish this file sharing, they leverage cloud-based file-sync and share solutions. The problem is

Tagged with: , , , , , , , ,
Posted in Webinar

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,973 other followers

Blog Stats
  • 1,370,196 views