Blog Archives

Why Backups Can’t Protect Against Ransomware

Ransomware is a new type of threat. As a result it needs a new type of defense. The reason is simple: Backups are not enough to protect against ransomware. They are increasingly victims of the attack themselves, and they don’t

Tagged with: , , , , , , ,
Posted in Blog

Why Would a Service Provider Want Object Storage?

Object storage was built for the cloud; therefore, any company considering providing storage services for other companies will find object storage the best fit for that application. Other shared storage systems, such as NAS filers, simply do not compare when

Tagged with: , , , , ,
Posted in Blog

How To Solve The Three Biggest HCI Adoption Challenges

Guaranteeing application performance, creating a cloud like consumption model and timing the simultaneous replacement of three data center architectures are the biggest hindrances to HCI adoption. Hyperconverged infrastructures (HCI) promise to simplify a data center, making it more cloud like.

Tagged with: , , , , , , , , ,
Posted in Blog

Best Next Steps for the Hybrid Cloud

Companies that are deciding to leverage a hybrid cloud infrastructure have a number of options available to them that others do not. But since the concept of hybrid cloud is still so new, it’s not always obvious what the choices

Tagged with: , , , , , , , ,
Posted in Blog

What is Ransomware?

Ransomware is one of the biggest threats facing IT. What exactly is ransomware? Ransomware is a program that once installed in a system encrypts an organization’s data and the only way to get it unencrypted is to pay a fee

Tagged with: , , , , , , , ,
Posted in Blog

Dell EMC Integrate DRaaS to Data Protection Portfolio

Organizations that count on EMC’s data protection software that also want DRaaS don’t have to consider switching to another solution. At Dell EMC World 2017, the company announced Data Domain Cloud DR. Disaster Recovery as a Service (DRaaS) leverages the

Tagged with: , , , , , , , , , ,
Posted in Blog

Is Mutual Mystification Part of your Disaster Recovery Plan?

It is impossible for all applications to be recovered instantly with no data loss after a disaster. But that is exactly what users expect. We find in some organizations IT avoids having the necessary conversation that brings users and application

Tagged with: , , , , , , , , , , ,
Posted in Blog

Deep Dive XtremIO X2 – Dell EMC World 2017

The press releases are out there but they only cover the XtremIO announcement at a high level. It’s time for a deeper dive. At Dell EMC World, Storage Switzerland spent quality time on the XtremIO X2 update. It promises increased

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Dell EMC Delivers Data Domain Virtual Edition 3.1 for In-Cloud Data Protection

One of the first announcements out of the chute at Dell EMC World 2017 is an updated version of Data Domain’s Virtual Edition (DD VE). The new version runs in both Amazon and Azure clouds and is designed to provide

Tagged with: , , , , , , ,
Posted in Blog

ChalkTalk Video: What is Cloud Based Copy Data Management?

Cloud based copy data management (CDM) has the potential to extract even more value from copy data than does conventional CDM solutions. Copy data is the copies of production data used to feed various other processes in the data center

Tagged with: , , , , , , ,
Posted in Video