Blog Archives

What to Look for in Cloud Native Backup

Users and software vendors realize the importance of protecting cloud-native applications. While cloud providers generally do an excellent job of protecting applications from a disaster they don’t provide easy access to tools to provide point-in-time backups which are necessary to

Tagged with: , , , , , , , , , ,
Posted in Blog

Webinar: Holistic Disaster Recovery; from Data Center to Endpoint

Most disaster recovery strategies focus exclusively on the data center but most users use laptops and other endpoints to get their work done. And those endpoints often have unique, business critical data on them. Data center servers and storage as

Tagged with: , , , , , , , , , ,
Posted in Webinar

Object Storage or Cloud for Enterprise File Sync and Share

Enterprise File Sync and Share (EFSS) is a “must deliver” for IT since most users perceive the capability to be a “must have”. In our last blog we discussed what to look for in an EFSS and explained the advantages

Tagged with: , , , , , , , , , , ,
Posted in Blog

Making NoSQL Protection Operations Driven – Imanis Data Briefing Note

It seems like backup vendors forgot about protecting NoSQL environments. Environments like Cassandra, MongoDB, Hortonworks, Couchbase, and Hadoop all need point-in-time protection. One reason for the lack of data protection solutions for these environments is that there is an assumption

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Office 365 Delete Items Folder – Isn’t 24,855 days enough?

A question that came up on our on demand webinar “Next Question: How to protect Office 365” was “Can’t I just use the Deleted Items Folder?” The deleted items folder does help prevent some data loss. Microsoft Office 365 allows

Tagged with: , , , , , , , ,
Posted in Blog

Do You Need to Backup Cloud Native Applications?

A common question from organizations with cloud native applications is do they need to back those applications up? The cloud, after all provides plenty of redundancy and all major cloud providers have multiple data centers at their disposal. Most providers

Tagged with: , , , , , , , , , ,
Posted in Blog

Office 365 Backup Without Lock-in – BackupAssist 365 Briefing Note

The popularity of Office 365 continues to increase. Organizations large and small are adopting the service for office productivity and communications. Office 365 provides excellent service availability. If a server or storage system within the service fails within the service,

Tagged with: , , , , , , , , ,
Posted in Briefing Note

The Evolution of Ransomware – Is Backup Safe?

When ransomware first appeared in data centers, it had a simple attack pattern. Once it landed inside the data center, the malware tried to encrypt every file as fast as possible. If IT didn’t have good backups, the organization was

Tagged with: , , , , , , , ,
Posted in Blog

Decisions the Enterprise Must Make When Considering Cloud Backup

In our first column we discussed what cloud providers needed to provide to make the enterprise more comfortable with using the cloud for backup. In this entry we discuss how to choose the right cloud provider and give an example

Tagged with: , , , , , , , , , , ,
Posted in Blog

The Myth of NoSQL Data Protection

There is a debate circling the topic of NoSQL data protection. A common myth is that because these environments automatically create replicas, data protection isn’t needed. Replicas protect the NoSQL environment from a hardware failure within a node or even

Tagged with: , , , , , , , , , , ,
Posted in Blog