Blog Archives

Object Storage Vs. The Public Cloud – Friend or Foe

In our on demand webinar, “2019 Storage Strategies Series – What’s Your Plan for Object Storage?” one of the key points of discussion will be about the cloud. Most cloud providers have a tier of storage built from object storage

Tagged with: , , , , , , , , , , ,
Posted in Blog

An Endpoint Strategy is More Than a Backup Strategy

Endpoints are a growing concern for enterprises, more employees have them (most have two or three), users store more data on them than ever (30% of that data is unique) and the data on these endpoints are within the scope

Tagged with: , , , , , , , , ,
Posted in Blog

Is File Sync and Share OK for Endpoint Backup?

A surprising number of organizations and users consider their file sync and share (FSS) solution to be a suitable replacement for backup. With an FSS solution if a user accidentally deletes a file the FSS service can provide the user

Tagged with: , , , , , , , , , ,
Posted in Blog

Dashboarding Diverse Storage Infrastructures

The previous blog in this series outlined the advantages of a diverse storage infrastructure; flexibility, workload specific performance, and hard-cost savings. The challenge with a diverse storage infrastructure is how to manage it. In prior blogs, we’ve looked at several

Tagged with: , , , , , , , , , ,
Posted in Blog

Protecting Against Departing Users

One of the top ways that data “leaks” out of an organization is through the endpoints (laptops, tablets, and smartphones) of departing users. IT should, of course, do what it can to prevent data leakage, but it also should make

Tagged with: , , , , , , , , ,
Posted in Blog

Embracing the Cloud for More Effective Endpoint Disaster Recovery

In a world where enterprise mobility and cyber-attacks are simultaneously booming, protecting endpoints has become crucial to business longevity. Laptops are the primary target for malware such as ransomware. Also, these devices are prone to being lost or stolen –

Tagged with: , , , , , , , , ,
Posted in Blog

The Rising Ransomware Threat Heightens Urgency for Endpoint Protection

The ransomware threat continues to grow – and this is indeed significant, as ransomware cost businesses $5 billion during 2017, according to Cisco. Many organizations that have been attacked are paying the ransom demanded, causing the number of attacks to

Tagged with: , , , , , , , , ,
Posted in Blog

Revamping Your Endpoint Protection Strategy to Minimize Downtime and Data Loss

Endpoint protection threatens to be the Achilles heel of modern IT shops. The need to protect endpoints has been around for decades – but doing so remains largely painful, especially as enterprise mobility usage proliferates. Protecting hundreds or thousands of

Tagged with: , , , , , , , ,
Posted in Blog

Is the Ransomware Scare Over?

In 2017, Ransomware attacks like WannaCry and Locky made headlines as organizations worldwide were infected. Data protection vendors of all types went to work hardening their solutions and advancing them to help customers recover from the threat. However, ransomware attacks

Tagged with: , , , , , , , , ,
Posted in Blog