Blog Archives

How to Provide Rapid Recovery for Mission-Critical Applications

When mission-critical applications go down, bad things happen. Organizations lose revenue, users and customers are dissatisfied. IT loses its reputation and sometimes even their jobs. There is no arguing that these applications need to be protected regularly and recovered quickly.

Tagged with: , , , , , , , , , ,
Posted in Blog

SlideShare: Hitting Your Data Protection Sweet Spot

The data protection process sometimes has objectives that seem to be in opposition to one another. On one side, the organization needs rapid and frequent data captures so that RPOs and RTOs are met. On the other side, there is

Tagged with: , , , , , , , , , ,
Posted in Slideshare

How to Implement Replication for Rapid Recovery

For organizations needing to protect mission-critical critical systems, software-based replication is an ideal way to meet and potentially exceed expectations. In fact, replication can be implemented so cost effectively that the scope of coverage can extend beyond mission-critical systems and

Tagged with: , , , , , , , , , ,
Posted in Blog

StorageShort: Disaster Recovery – Secondary Site vs. Public Cloud

During a disaster everyone needs a place to go, including an organization’s applications and data. Ideally that “place” is prepared. For decades the only real decision for IT was just how prepared would the DR site be? Options ranged from

Tagged with: , , , , , , , , , ,
Posted in StorageShort

How to Protect Mission Critical Applications

While they should only represent a small percentage of your environment, mission critical applications need the most attention when designing a protection process for them. Most of these applications can only be down for a few minutes and can only

Tagged with: , , , , , , , , , , ,
Posted in Blog

Webinar: Hitting Your Data Protection Sweet Spot

The data protection process sometimes has objectives that seem to be in opposition to one another. On one side, the organization needs rapid and frequent data captures so that RPOs and RTOs are met. On the other side, there is

Tagged with: , , , , , , , , , ,
Posted in Webinar

How to Prepare for the Next WannaCry

WannaCry was a wakeup call. New ransomware strains are now appearing every week because ransomware is a profitable “business.” There will be another attack and the chances of your organization being infected are high. The time is now to take

Tagged with: , , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 22,047 other followers

Blog Stats
  • 1,444,775 views