Blog Archives

Webinar – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Webinar

Backup Endpoints So You Can Wipe Them

One of the best reasons to backup endpoints like laptops, tablets and smartphones has nothing to do with restores, it has to do with deletion. Endpoints are the most vulnerable to theft. They are left in airport security lines, Starbucks

Tagged with: , , , , , , ,
Posted in Blog

Trusting and Testing DRaaS

Many organizations count on a Disaster Recovery as a Service (DRaaS) solution to enable them to bounce back quickly if a disaster strikes their primary data center. DRaaS saves organizations the expenses associated with investing in and equipping a disaster

Tagged with: , , , , , , , ,
Posted in Blog

Can Hyperconverged Infrastructure Solve Storage Sprawl?

Hyperconverged Infrastructures (HCI) move software-defined storage (SDS) – described in the last blog – into the hypervisor cluster. The SDS component either runs as a virtual machine or as part of the hypervisor kernel itself. The SDS solution typically leverages

Tagged with: , , , , , , , , , ,
Posted in Blog

SlideShare: Using the Cloud to Fix Backup’s Blind Spot – Endpoint Data Protection

Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on

Tagged with: , , , , , , ,
Posted in Slideshare

The Dirty Little Secret about DRaaS

Disaster Recovery as a Service (DRaaS) is a game changer for many, cloud backup as a service providers. The service enables organizations to stand up instances of their mission critical applications in the provider’s cloud instead of recovering them across

Tagged with: , , , , , , , , ,
Posted in Blog

Webinar: Holistic Disaster Recovery; from Data Center to Endpoint

Most disaster recovery strategies focus exclusively on the data center but most users use laptops and other endpoints to get their work done. And those endpoints often have unique, business critical data on them. Data center servers and storage as

Tagged with: , , , , , , , , , ,
Posted in Webinar

Office 365 Delete Items Folder – Isn’t 24,855 days enough?

A question that came up on our on demand webinar “Next Question: How to protect Office 365” was “Can’t I just use the Deleted Items Folder?” The deleted items folder does help prevent some data loss. Microsoft Office 365 allows

Tagged with: , , , , , , , ,
Posted in Blog

Modern Data Protection Architectures Enable a Step-by-Step Cloud Journey

The cloud holds much promise for data protection, but support for the cloud varies depending on the solution. Traditional backup applications and appliances have, at best, rudimentary support for the cloud. They may only mirror the on-premises copy of data

Tagged with: , , , , , , , , , ,
Posted in Blog

SlideShare: Why Cloud Migrations Fail – Learn the Keys to Cloud Success

Many cloud migration and cloud first strategies fail to live up to expectations. The problem is organizations spend too much time on micro issues like product selection and not enough time on big picture items like the cloud strategy’s foundation.

Tagged with: , , , , , , , , ,
Posted in Slideshare