The 3-2-1 rule states that an organization should have three copies of data on two different types of media, with IT storing one copy off-site and preferably offline. Traditionally, organizations count on the backup process to meet the 3-2-1 rule’s…
When it comes to storing backup data, IT professionals have a lot of options from which to choose. Dedicated backup appliances tend to be the most popular selection. Another option is using the backup software’s built-in storage capabilities and building…
The goal of cyber-secure storage is to eliminate attempts to breach an organization’s storage and access its data. The prior three blogs describe methods IT can take to better protect the organization’s data assets; however, despite all the best efforts,…
The growth of primary storage has an exponential effect on data protection infrastructure. Demands to protect data more frequently, recover faster and retain data longer promise to make the situation worse. The total cost of ownership (TCO) of the data…
Encryption is a foundational component of a cyber-secure storage system. The problem is that most organizations implement encryption after-the-fact, months if not years after the initial implementation. When IT is considering a new storage system, they tend to focus on…
NoSQL and Hadoop typically distribute data through the use of built-in replication technology. The replication process also provides protection from media or server failure. Many IT professionals, as a result, think that they don’t need to backup these environments. In…
Secondary data continues to grow at an unprecedented pace and organizations are increasingly using that data for purposes beyond backup and archive. IT needs a way to visualize, manage and take action on their secondary data and applications. Organizations also…
Organizations make significant investments in their infrastructure. As production data continues to grow, the exponential impact on backup storage threatens to deplete IT budgets. The cloud promises to reduce on-premises backup infrastructure but most solutions only use the cloud to…