Blog Archives

Why Not Build Ransomware Proof Storage?

The best way to protect an organization from a ransomware attack is at its source, primary storage. Ransomware works by compromising a user account and then encrypting all the files that the account can access. A compromised superuser account is

Tagged with: , , , , , , , ,
Posted in Blog

How Data Management Protects Against Cyber-Attacks

The reason that file data is a prime target of ransomware attacks is that most file servers are full of juicy targets that organizations are willing to pay to get back. Payment is, after all, exactly what ransomware is all

Tagged with: , , , , , , , , , ,
Posted in Blog

Is it Time to De-Tape Your Archive?

Enterprises want more value from their archived data assets but tape doesn’t really enable the real-time archive that organizations need. The challenges is that any enterprise in existence for 10 years or longer more than likely has terabytes, even petabytes,

Tagged with: , , , , , , , , ,
Posted in Article

Live Webinar: 5 Steps To The Perfect Storage Refresh

An Independent Process for Assessing & Refreshing Storage Every data center eventually needs to increase capacity, resiliency, performance or the cost efficiency of its storage architecture. It needs to refresh storage infrastructure. The problem is that most organizations don’t have

Tagged with: , , , , , , , ,
Posted in Webinar