Blog Archives

How to Stop Ransomware Before The Damage Is Done

NTP Software Defendex™ Product Analysis Ransomware is, for good reason, top of mind right now. Most strategies under discussion now are actually responses, not analysis and elimination. And, because ransomware is such a profitable “business,” new versions will continue to

Tagged with: , , , , , , , , ,
Posted in Blog

Is it Time to De-Tape Your Archive?

Enterprises want more value from their archived data assets but tape doesn’t really enable the real-time archive that organizations need. The challenges is that any enterprise in existence for 10 years or longer more than likely has terabytes, even petabytes,

Tagged with: , , , , , , , , ,
Posted in Article

ChalkTalk Video: WannaCry, Snowden, Wikileaks… Is Your Data Next?

When IT defenses are compromised, the organization faces one of two challenges. Either the data is encrypted by a ransomware attack or it is copied to the attacker’s servers. In the first case, assuming data protection is in place and

Tagged with: , , , , , , , , ,
Posted in Video

What if Archive Storage Cost More Than Primary?

Even if archive storage was the same price as primary storage, you’d still want to archive. While most in IT look at archiving as a way to reduce the cost of primary storage there is a lot more to it

Tagged with: , , , , , , ,
Posted in Blog

Why Would You Put SQL Server in a Container? – WinDocks Briefing Note

There’s no question that containers are growing in popularity, and attendance at this year’s DockerCcon is evidence of that. But the bulk of applications that are moving into containers still tend to be stateless applications without the need for persistent

Tagged with: , , , , , , ,
Posted in Briefing Note