Blog Archives

Chalk Talk Video – What is GRO? Geographic Recovery Objective

Below is our latest whiteboard video featuring George Crump, Lead Analyst. He provides a preview of one of the areas covered in our ongoing series of workshops with TechTarget and Storage Decisions. In fact, Thursday, March 13th we will be in

Tagged with: , , , , , , ,
Posted in Video

What is RPO? – Recovery Point Objective

Data Protection Workshop

Below is our latest whiteboard video featuring George Crump, Lead Analyst. He provides a preview of one of the areas covered in our upcoming series of workshops with TechTarget and Storage Decisions. In fact, Tuesday, September 29th we will be

Tagged with: , , , , , ,
Posted in Video

How Data Deduplication Impacts Recovery

Data deduplication has become a standard offering in backup product portfolios. As a technology that has been mainstream for over five years, some IT decision makers may tend to treat deduplication as an afterthought. In actuality, how data deduplication is

Tagged with: , , , , , , ,
Posted in Article

Webinar – How Server Virtualization Is Breaking Disk Backup

How Server Virtualization is Breaking Disk Backup

Disk Backup Appliances have traditionally featured deduplication as the primary selling point. While efficiently storing protected data is critical, the ability to scale your systems to meet rampant data growth – while maintaining backup windows and meeting recovery objectives –

Tagged with: , , , , , ,
Posted in Webinar

How Backup Disk Architecture Impacts the Backup Window

Like death and taxes, growing backup windows seems to be an inevitable fact of life. To stave off the backup window, IT architects have resorted to a myriad of tactics to stay one step ahead. The most popular tactic in

Tagged with: , , , , , , , , , , , ,
Posted in Article

Backup Basics: What do SLO, RPO, RTO, VRO and GRO Mean?

Being in charge of the data protection process is a thankless job. The process you create can run perfectly 99% of the time but everyone will remember the 1 time it fell short, and they will blame you. The task

Tagged with: , , , , , , ,
Posted in Article

What Is Protection Storage?

What is protection storage? Is this merely a way to re-package the role of purpose-built data deduplication appliances or are there some unique attributes to protection storage that warrants closer scrutiny from technology decision makers? In short, protection storage drives

Tagged with: , , , , , ,
Posted in Blog

Asigra – All-in-One-Backup – From the Enterprise to the Cloud

Protecting data is becoming increasingly complex and fraught with risk. Today, business data resides on everything from centralized, virtualized server infrastructure to public cloud software applications, to end user mobile edge devices. Finding a way to reliably and efficiently protect

Tagged with: , , , , , , , , ,
Posted in Product Analysis

Webinar – The Business of Backup – The Impact of Backup Licensing on IT Budgets

Thanks to virtualization and improved abilities in backup software, the data protection process has become easier to implement and operate but unlike other technologies, it has not become less expensive. Whether the licensing strategy is module based or capacity based,

Tagged with: , , ,
Posted in Webinar

The Value of Real Time Backup Health Assessment

Change is good…or is it? The sheer volume and velocity of changes taking place in IT environments today is staggering. While change may be good for business needs, if left unchecked, improperly managed changes within the backup environment could deal

Tagged with: , , , , , , , , ,
Posted in Article