Blog Archives

Why Windows File Server Archive ROIs are Broken

Windows file server archiving is the process of getting all the old data off of an organization’s Windows file servers and moving them to some less expensive form of storage. The concept has been around almost since there were Windows

Tagged with: , , , , , , , , ,
Posted in Blog

Can You Actively Protect Against Ransomware? – Acronis Backup 12.5 Briefing Note

It is possible to identify and stop ransomware in its tracks. It’s also possible to recover from the damage that ransomware attacks cause. It requires a multi-level approach using intrusion detection systems, ransomware detection systems, and a backup and recovery

Tagged with: , , , , , , ,
Posted in Briefing Note

Refining The Virtualized Backup Process – NAKIVO Briefing Note

The backup software market is very mature. Even virtualization specific backup software solutions have been available for over 10 years. But there is still work to do. In some cases, new releases are taking advantage of new technologies elsewhere in

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

Integration Primary and Secondary Storage – Reduxio Briefing Note

In most data centers, there are two distinct types of storage. Primary storage to respond to the needs of performance demanding applications and secondary storage to maintain a backup and provide secondary copies of the primary storage. These two tiers

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

Does The Cloud Need Backup?

There is no such thing as the cloud; there is only somebody else’s computer. Data stored in the cloud (i.e. on someone else’s computer) needs to be protected just like data stored on your own computer. No one would question

Tagged with: , , , , , ,
Posted in Blog

SlideShare: 15 Minute Ransomware Survival Guide

Ransomware is a new threat, and new threats require new strategies. Within the first 15 minutes this webinar will provide you key strategies for surviving a ransomware attack. During the event Storage Switzerland and Commvault cover the three P’s of

Tagged with: , , , , , , ,
Posted in Slideshare

Ransomware Protection Requires Different Protocols

The core server component of most modern backup applications run on Windows. Unfortunately, Windows is also the primary target of ransomware attacks. While there are incidents of attacks on Linux or Macs, ransomware creators are going to go for the

Tagged with: , , , , , , , ,
Posted in Blog

How To Design a Hyper-V Disaster Recovery Plan

Server Failure, Storage System Failure and Data Center Failure are all forms of disaster that will impact the Hyper-V environment. Now IT planners should add ransomware to that list. How does the Hyper-V Administrator design a disaster recovery plan? Disaster

Tagged with: , , , , , , , , , , , ,
Posted in Blog

New Threats Require Better DR – CloudEndure Briefing Note

Despite the rising concerns over cyber-attacks like ransomware, humans are still the number one cause of disasters. We need to look no further than the Amazon “typo error” of 2017 that knocked out service on AWS for proof. According to

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

Testing is the Key to Ransomware Success

IT’s goal should be to never pay a ransom as a result of a ransomware attack. To achieve that goal requires prevention, preparation and practice. Unfortunately, practice is the element most overlooked but potentially the most critical. Why Ransomware Testing

Tagged with: , , , , , ,
Posted in Blog