Blog Archives

What is Consumption Based Data Protection?

The data protection process has three key costs; the software that protects data; the hardware that drives that software and stores protected copies of data and the administration time required to manage the process. The upfront costs are a challenge

Tagged with: , , , , , , , , ,
Posted in Blog

How the Rights of the Digital Citizen Impacts Storage Infrastructure

In our on demand webinar, “Designing Storage Architectures for Data Privacy, Compliance and Governance” we discuss the impact of regulations like the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) on storage architectures. One of

Tagged with: , , , , , , , , ,
Posted in Blog

Object Storage Vs. The Public Cloud – Friend or Foe

In our on demand webinar, “2019 Storage Strategies Series – What’s Your Plan for Object Storage?” one of the key points of discussion will be about the cloud. Most cloud providers have a tier of storage built from object storage

Tagged with: , , , , , , , , , , ,
Posted in Blog

Do You Need to Re-Prioritize Unstructured Data Management Priorities?

In our on demand webinar “The Elephant in the Data Center – Protecting, Managing and Leveraging Unstructured Data”, Storage Switzerland and Igneous discuss the recent 2018 State of Unstructured Data Management report. The report is available as an attachment to

Tagged with: , , , , , , , , ,
Posted in Blog

An Endpoint Strategy is More Than a Backup Strategy

Endpoints are a growing concern for enterprises, more employees have them (most have two or three), users store more data on them than ever (30% of that data is unique) and the data on these endpoints are within the scope

Tagged with: , , , , , , , , ,
Posted in Blog

Scale-Out Storage: The Advantages of Replication vs. Erasure Coding

Scale-out storage systems tend to protect data from media failure in one of two ways; they either use replication or erasure coding. Replication creates a user-defined number of copies of data, typically a minimum of three, as it is created

Tagged with: , , , , , , , , ,
Posted in Blog

Webinar: Consumption Based Data Management Providing Peace of Mind

Consumption based IT is a curated set of IT solutions that focus on business outcomes. As the name implies it is purchased on a pay-as-you-go model. The goal of consumption based IT is to simplify establishing IT infrastructure that incorporates

Tagged with: , , , , , , , , ,
Posted in Webinar

The Anatomy of the Copy Data Problem

Countless IT processes count on copies of data. Backup is an obvious example, but test/dev, analytics processing, reporting, and file auditing are others. Various studies have indicated that copy data can consume as much as 10X the space consumed by

Tagged with: , , , , , , , , ,
Posted in Blog

SlideShare: Evolving Data Protection from Backup to Copy Data Management

Copy Data Management promises to not only improve the data protection process, it promises to provide value to the organization even without a looming disaster. It can reduce storage costs by presenting virtual copies of data to test/dev, analytics and

Tagged with: , , , , , , , , ,
Posted in Slideshare

Lightboard Video: Managing Unstructured Data at Scale

Unstructured data as it scales from terabytes to petabytes creates a massive problem for organizations as they attempt to protect and manage that data. IT struggles with gaining visibility into the state of their unstructured data, which often requires multiple

Tagged with: , , , , , , , ,
Posted in Video