Blog Archives

SlideShare: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018

And how to counter them Organizations are facing increasing businesses continuity and resiliency challenges in 2018. Much of these pressures – such as security threats, an increase in the number of mission critical applications, and data shifting to the cloud

Tagged with: , , , , , ,
Posted in Slideshare

StorageShort: Is Your Backup Hybrid IT Ready?

Organizations looking to adopt a Hybrid IT strategy are facing new challenges when it comes to protecting these environments. The single biggest challenge is that the application and its data can be on-premises or in the cloud without the data

Tagged with: , , , , , ,
Posted in StorageShort

Primary Storage Should Secure Itself – RackTop Systems Briefing Note

News of another data breach is becoming all too common of an occurrence. The cost to the organization is not just its reputation but increasingly results in punitive fines. The European Union’s General Data Protection Regulation (GDPR) set a new

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

Meeting the Core Principles of Data Protection

As the data center modernizes, new initiatives and trends are impacting the data protection process. In our webinar, “5 Key Trends that Could Challenge Your Data Protection Plan in 2018,” we discuss how things like Hybrid IT, Ransomware, application explosion,

Tagged with: , , , , , , ,
Posted in Blog

Understanding the Data Center Trends That Will Impact Data Protection

The data center keeps evolving, and each new trend that comes into the data center impacts the data protection process in some way. Trends like the shift to hybrid IT, cyber-threats, the explosion in the number of mission-critical applications, the

Tagged with: , , , , , , ,
Posted in Blog

White Paper: Is Your DR Plan Ready for 2018?

When was the last time you looked at your disaster recovery plan? The beginning of a new year is an excellent time to review it and make sure it is ready for changes within your data center, and changes to

Tagged with: , , , , , , , , , , ,
Posted in Blog

Ransomware: The Problem with Paying the Ransom

When ransomware hits an organization, it is very tempting simply to pay the ransom instead of going through the time and effort to replace the encrypted data by recovering from a backup. After paying the ransom, the hackers give a

Tagged with: , , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,775 other followers

Blog Stats