Blog Archives

Speed is Critical For Ransomware Recovery

Speed of recovery from any disaster is always important, but it is most critical in terms of recovering from a ransomware attack. Most ransomware fees are typically a few thousand dollars, and are rarely more than $20,000. For the organization,

Tagged with: , , , , , , , , ,
Posted in Blog

Why Windows File Server Archive ROIs are Broken

Windows file server archiving is the process of getting all the old data off of an organization’s Windows file servers and moving them to some less expensive form of storage. The concept has been around almost since there were Windows

Tagged with: , , , , , , , , ,
Posted in Blog

Can You Actively Protect Against Ransomware? – Acronis Backup 12.5 Briefing Note

It is possible to identify and stop ransomware in its tracks. It’s also possible to recover from the damage that ransomware attacks cause. It requires a multi-level approach using intrusion detection systems, ransomware detection systems, and a backup and recovery

Tagged with: , , , , , , ,
Posted in Briefing Note

Refining The Virtualized Backup Process – NAKIVO Briefing Note

The backup software market is very mature. Even virtualization specific backup software solutions have been available for over 10 years. But there is still work to do. In some cases, new releases are taking advantage of new technologies elsewhere in

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

Integration Primary and Secondary Storage – Reduxio Briefing Note

In most data centers, there are two distinct types of storage. Primary storage to respond to the needs of performance demanding applications and secondary storage to maintain a backup and provide secondary copies of the primary storage. These two tiers

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

Does The Cloud Need Backup?

There is no such thing as the cloud; there is only somebody else’s computer. Data stored in the cloud (i.e. on someone else’s computer) needs to be protected just like data stored on your own computer. No one would question

Tagged with: , , , , , ,
Posted in Blog

SlideShare: 15 Minute Ransomware Survival Guide

Ransomware is a new threat, and new threats require new strategies. Within the first 15 minutes this webinar will provide you key strategies for surviving a ransomware attack. During the event Storage Switzerland and Commvault cover the three P’s of

Tagged with: , , , , , , ,
Posted in Slideshare