Blog Archives

Making Primary Storage Fulfill the 3-2-1 Rule

The 3-2-1 rule states that an organization should have three copies of data on two different types of media, with IT storing one copy off-site and preferably offline. Traditionally, organizations count on the backup process to meet the 3-2-1 rule’s

Tagged with: , , , , , , , , ,
Posted in Blog

SlideShare: How to Create a Great Disaster Recovery Plan

Many studies indicate that organizations have a shallow confidence level in their ability to recover from a disaster. The disaster recovery plan is often an ad-hoc plan that requires IT to scramble when disaster strikes. If the recovery effort succeeds,

Tagged with: , , , , , , , ,
Posted in Slideshare

Building a Better Backup Appliance – iXsystems Briefing Note

When it comes to storing backup data, IT professionals have a lot of options from which to choose. Dedicated backup appliances tend to be the most popular selection. Another option is using the backup software’s built-in storage capabilities and building

Tagged with: , , , , , , , ,
Posted in Briefing Note

Breach – Preparing Cyber-Secure Storage for the Inevitable

The goal of cyber-secure storage is to eliminate attempts to breach an organization’s storage and access its data. The prior three blogs describe methods IT can take to better protect the organization’s data assets; however, despite all the best efforts,

Tagged with: , , , , , , , ,
Posted in Blog

How to Reduce the TCO of Data Protection Infrastructure

The growth of primary storage has an exponential effect on data protection infrastructure. Demands to protect data more frequently, recover faster and retain data longer promise to make the situation worse. The total cost of ownership (TCO) of the data

Tagged with: , , , , , , , ,
Posted in Blog

SlideShare: What’s Breaking Your VMware Backups? And How You Can Fix Them Quickly

Backing up VMware successfully has always been a challenge. The introduction of the cloud ever increasing scale of VMware infrastructure continues to give backups fits and makes it even harder. Please join George Crump, Lead Analyst at Storage Switzerland and

Tagged with: , , , , , , , , , ,
Posted in Slideshare

The Challenges of After-The-Fact Encryption

Encryption is a foundational component of a cyber-secure storage system. The problem is that most organizations implement encryption after-the-fact, months if not years after the initial implementation. When IT is considering a new storage system, they tend to focus on

Tagged with: , , , , , , , ,
Posted in Blog

ChalkTalk Video: Key Architecture Requirements for Tackling Hadoop and NoSQL Backup and Recovery

NoSQL and Hadoop typically distribute data through the use of built-in replication technology. The replication process also provides protection from media or server failure. Many IT professionals, as a result, think that they don’t need to backup these environments. In

Tagged with: , , , , , , , , ,
Posted in Video

ChalkTalk Video: Managing Secondary Data Globally

Secondary data continues to grow at an unprecedented pace and organizations are increasingly using that data for purposes beyond backup and archive. IT needs a way to visualize, manage and take action on their secondary data and applications. Organizations also

Tagged with: , , , , , , , , ,
Posted in Video

Will Cloud Backup Really Reduce Your Backup Investment?

Organizations make significant investments in their infrastructure. As production data continues to grow, the exponential impact on backup storage threatens to deplete IT budgets. The cloud promises to reduce on-premises backup infrastructure but most solutions only use the cloud to

Tagged with: , , , , , , , , , , ,
Posted in Blog