Blog Archives

Achieving the right RPO for your Virtualized Environment

Recovery Point Objective (RPO) is potentially the most important requirement to understand when protecting any application or environment. RPO is essentially the amount of data that will be lost when an application is recovered. The less frequent the protection the

Tagged with: , , , , , , , , , ,
Posted in Blog

Webinar: Selecting the right tools to meet your Virtual RTO/RPO Objectives

Organizations have high expectations of data protection professionals to return applications to production. In the virtual environment in particular, cost effective tools exist to help meet those objectives. But which one should you use, and when? After all, not all

Tagged with: , , , , , , , , , ,
Posted in Webinar

Is Traditional Backup Obsolete?

As we will discuss in our upcoming webinar, creating a second copy in order to protect important data is becoming increasingly inefficient, a fact driven home by the relentless growth of ‘copy’ data in companies of all sizes. Setting up

Tagged with: , , , , , , , ,
Posted in Blog

A Tiered Approach To Data Protection

Think your data is protected? Think again. True data protection is more than just enterprise backup, snapshots and replication; it’s a combination of all of these technologies. Understanding how to leverage each type of data protection is key towards enabling the rapid recovery of mission critical business information while not overspending on data protection insurance. In this article, lead analyst George Crump, outlines the specific role each type of data protection technology serves in the data center and how organizations can tier their data protection strategy for the maximum cost/benefit. 

Tagged with: , , , , , , , ,
Posted in Article