Blog Archives

The Myth of NoSQL Data Protection

There is a debate circling the topic of NoSQL data protection. A common myth is that because these environments automatically create replicas, data protection isn’t needed. Replicas protect the NoSQL environment from a hardware failure within a node or even

Tagged with: , , , , , , , , , , ,
Posted in Blog

Do You Need to Backup Office 365?

Office 365 lives in Microsoft’s Azure cloud service. That service consists of more than one location and certainly more than one server. Microsoft does an excellent job of keeping the service available, and to most users, it feels like it

Tagged with: , , , , , , , , , , ,
Posted in Blog

The Top Three Cloud Recovery Concerns

The cloud reduces an organization’s disaster recovery (DR) costs while at the same time upgrading its quality. Cloud DR has a mathematical advantage over internal DR. The organization doesn’t have to invest in a DR site nor does it need

Tagged with: , , , , , , , ,
Posted in Blog

SlideShare: How to Create a Great Disaster Recovery Plan

Many studies indicate that organizations have a shallow confidence level in their ability to recover from a disaster. The disaster recovery plan is often an ad-hoc plan that requires IT to scramble when disaster strikes. If the recovery effort succeeds,

Tagged with: , , , , , , , ,
Posted in Slideshare

Building a Better Backup Appliance – iXsystems Briefing Note

When it comes to storing backup data, IT professionals have a lot of options from which to choose. Dedicated backup appliances tend to be the most popular selection. Another option is using the backup software’s built-in storage capabilities and building

Tagged with: , , , , , , , ,
Posted in Briefing Note

SlideShare: Backup vs. Ransomware – 5 Requirements for Backup Success

Ransomware is the universal threat. No matter an organization’s data center location, or its size, it can be devastated by a ransomware attack. While most organizations focus on the periphery, they also need to be prepared for a breach, something

Tagged with: , , , , , , ,
Posted in Slideshare

What to do if Ransomware Strikes a Physical System

With ransomware, unlike almost any other form of disaster, there is an alternative to recovering from backups…pay the ransom. While one can argue the risk associated with paying a ransom, the organization may see it as a viable option. IT

Tagged with: , , , , , , , ,
Posted in Blog