Blog Archives

Protection Service Levels – Sometimes OK is OK

In my last blog “The Problem with Gold-Only Data Protection Service Levels” we looked at how to design a gold service level for data protection and what the pros and cons of that approach are. In this entry, we look

Tagged with: , , , , , , , , , ,
Posted in Blog

How to Evolve From Unstructured Data Protection to Unstructured Data Management

A recent report from Igneous, “The State of Unstructured Management 2018,” indicates that most IT professionals are not satisfied with their ability to meet organizational expectations about the backup, recovery, and retention of their unstructured data sets. The value that

Tagged with: , , , , , , , , , , ,
Posted in Article

How Holistic Can a Backup Solution Become?

In a recent webinar, “Holistic Disaster Recovery; from Data Center to Endpoint”, Storage Switzerland discussed the concept of end-to-end (or holistic) disaster recovery. One of the questions asked was “How holistic can a backup solution become?” Which, considering that most

Tagged with: , , , , , , , , , , , ,
Posted in Blog

StorageShort: The Changing Face of Disasters

When it comes to disaster recovery planning, we tend to focus on grand scale events that impact entire regions of a country. The reality is though that most disasters are smaller in scale. These smaller disasters have a similar severity

Tagged with: , , , , , , , , , ,
Posted in StorageShort

The Problem with Gold-Only Data Protection Service Levels

A recent Storage Switzerland webinar dealt with the impact of the massive increase in the number of applications that data centers support on the data protection architecture. How does IT apply the right level of protection, set service levels, for

Tagged with: , , , , , , , , , ,
Posted in Blog

Solving The Challenge with Endpoint Data Strategies

Applying data center data management best practices to endpoints is particularly challenging. As discussed in our prior post, there is the physical challenge that most organizations have hundreds if not thousands of endpoints and those endpoints are mobile. Managing and

Tagged with: , , , , , , , , , , , , ,
Posted in Article

Endpoints – From Laptop Backup to Total Data Management

Today, even basic and consistent backups of endpoints are a rarity. Given all the threats that an organization faces, and the uniqueness and value of the data found on user devices like laptops, tablets, and smartphones, endpoint protection is critical

Tagged with: , , , , , , , , , , , , ,
Posted in Article

SlideShare: Application Explosion – Rediscovering the Lost Art of Protection Service Levels

The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the

Tagged with: , , , , , , , , , ,
Posted in Slideshare

SlideShare – Ransomware: Strategies for Protecting Your Weakest Link – Endpoints

Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they

Tagged with: , , , , , , , , ,
Posted in Slideshare

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,973 other followers

Blog Stats
  • 1,367,924 views