Blog Archives

Why Not Build Ransomware Proof Storage?

The best way to protect an organization from a ransomware attack is at its source, primary storage. Ransomware works by compromising a user account and then encrypting all the files that the account can access. A compromised superuser account is

Tagged with: , , , , , , , ,
Posted in Blog

Should Backup Software Companies Build an Appliance?

A little over 15 years ago we started to see the creation of the backup appliance market with the creation of the deduplication backup target appliance. Since that time, we’ve gone from having no backup appliances to having so many

Tagged with: , , , , , , , , ,
Posted in Article

How Data Management Protects Against Cyber-Attacks

The reason that file data is a prime target of ransomware attacks is that most file servers are full of juicy targets that organizations are willing to pay to get back. Payment is, after all, exactly what ransomware is all

Tagged with: , , , , , , , , , ,
Posted in Blog

StorageShort: The Recovery Paradox – Close Copy vs. Far

One of the challenges to designing a successful disaster recovery solution is where to keep copies of your data. A close copy allows for a rapid recovery in the event of a failure since it is seconds away. But in

Tagged with: , , , , , ,
Posted in StorageShort

Ransomware – How To Create a Proactive Protection File Strategy

IT needs a proactive way to stop ransomware. It’s here to stay. Most ransomware countermeasures are reactive. The damage is done before IT can deploy their reactive countermeasures. When ransomware gets through an organization’s defenses, it starts to encrypt data,

Tagged with: , , , , , , ,
Posted in Article

SlideShare: The Always-on Enterprise Requires New Service Level Objectives

The Always-on Enterprise is a data center that faced with even the most severe disaster can return applications to full working order in a matter of minutes. Service level objectives (SLOs) are the means by which IT and the organization

Tagged with: , , , , , , , ,
Posted in Slideshare

Does Disk Based Backup Require Deduplication Anymore?

Hardware-based deduplication legitimized the concept of backing up to disk. But deduplication alone is no longer as important as it used to be. The problem with hardware-based duplication is the data must be transferred to the backup appliance prior to

Tagged with: , , , , , , , , , ,
Posted in Blog

How To Beat Ransomware But Not Your Budget

The solution to ransomware is real-time data protection. The moment data changes it needs to be copied to a secondary storage system and sequestered from primary storage. Then, if a ransomware virus attacks, the last known good copy can be

Tagged with: , , , , , , ,
Posted in Blog

How Next-gen HSM Solutions Complement Backup

Organizations need to backup their data, but if you view backup as a one-size-fits-all job, where all data is treated equally, you’re missing an opportunity for substantial cost savings. Ideally, you could tier storage and create an “active archive” that

Tagged with: , , , , , , ,
Posted in Blog