Blog Archives

Protecting Your Data Protection’s Blind Side – Endpoints

Laptops, smartphones, and tablets are how users get work done. A surprising amount of organizational data is stored exclusively on laptops, never touching data center storage. Endpoints are also on the front lines of business where they are the most

Tagged with: , , , , , , , ,
Posted in Blog

The Changing Scope of Disaster Recovery

Disaster Recovery, for most organizations, used to mean making sure that a handful of mission-critical applications were protected and able to be brought back online in the event of a data center failure. The data center of today has changed

Tagged with: , , , , , , , , , , ,
Posted in Blog

Webinar: 2019 Storage Strategies Series – What’s Your Plan for Object Storage?

Join Storage Switzerland, Caringo, Cloudian and Scality, for a roundtable discussion on Object Storage. Learn what you need to know to develop a strategy for object storage. Our panel of experts discuss what object storage is, what is better/different about

Tagged with: , , , , , , , , , , ,
Posted in Webinar

A Collective Hive for HCI – Maxta MxIQ Briefing Note

Hyper-converged Infrastructure (HCI) simplifies many things for busy IT professionals. As their environment grows, HCI automatically scales with it, adding performance and capacity with each additional node. However, an area where HCI falls short, along with many other storage systems,

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

Creating a Data Center Compatible Cloud – Elastifile Briefing Note

Organizations spend months creating a “cloud strategy,” and then spend many more months attempting to execute that strategy, sometimes to successful completion but many times the project is abandoned. There are a multitude of problems when transitioning applications to the

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Re-setting the Bar for VMware Backups in the Cloud Era

In a world where IT is scrutinized based on the bottom line, it’s easy to deprioritize disaster recovery. Building out, refreshing and managing a dedicated infrastructure for disaster recovery requires significant capex investment and compounds the already heavy burden of

Tagged with: , , , , , , , , , , ,
Posted in Blog

Designing Backups for Data Privacy and Ransomware

Two external factors are forcing organizations to rethink their backup process and how they store backup data. The first is the ever-increasing threat of ransomware, which encrypts production data forcing the customer to pay for a “key” to decrypt it.

Tagged with: , , , , , , , , , , ,
Posted in Blog

The Advantages of a Diverse Storage Architecture

In the last three blogs, we’ve looked at how IT might consolidate storage by purchasing a single large array and using software-defined storage or using hyper-converged infrastructure. While each option has potential, each option also falls short in some areas.

Tagged with: , , , , , , , , , ,
Posted in Blog