Blog Archives

How to Facilitate Rapid Recovery

It’s no secret that rapid recovery is a non-negotiable business requirement today. Very few applications can stand even moments of downtime, never mind hours. However, getting there requires multiple steps that are not always immediately clear. The first step to

Tagged with: , , , , , , , , , , ,
Posted in Blog

Multi-Cloud versus the Five Requirements of Data – Datrium Briefing Note

Organizations need to meet five core requirements of the data they store; encryption, mobility, performance, retention and disaster recovery. To deliver these elements, IT is often forced to use five or more products just for on-premises data, let alone the

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Key Security Features to Evaluate in Your Cloud Provider

Cloud storage services have evolved significantly in terms of their ability to provide data security, as well as their ability to comply with data privacy regulations such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

MeetTheCEO: Cloud Daddy’s Spencer Kupferman

As businesses migrate more of their data and applications to the cloud, a more comprehensive and mature disaster recovery implementation is required. Cloud service providers have built a base layer of data protection capabilities that focus primarily on enabling recovery

Tagged with: , , , , , , , , , ,
Posted in Webinar

Hitachi Vantara Updates its Content Platform

Going Beyond Archive with Denser, More Intelligent Object Storage Object storage has long been viewed as an archive and long-term retention platform. But in the age of data-driven business intelligence, more frequent and more sophisticated cyberattacks, and data privacy regulations,

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

Webinar: Ransomware, Rapid Restoration and Disasters – Recovering from Backup’s Three Biggest Challenges!

Organizations need to make sure their backup infrastructure can meet the recovery objectives of today’s biggest challenges: ransomware, rapid restoration and disasters. Businesses expect their IT teams to recover faster than ever and they need business performance to be the

Tagged with: , , , , , , , ,
Posted in Webinar

Converged Data Protection – The Components Matter

Converged or hyperconverged data protection typically delivers a solution to the customer as a single SKU, but that SKU is made up of several components. Each component within the converged architecture is critical to the overall success of the solution.

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Is Enterprise File Sync and Share the Same as Data Protection?

Enterprise file sync and share (EFSS) services enable files that are stored either in an on-premises storage array or a cloud service, to be shared among multiple users and accessed by remote endpoint devices or desktops. Enterprise-grade EFSS services designed

Tagged with: , , , , , , , , , , , , , ,
Posted in Blog

What is Next-Generation Copy Data Management?

Copy data management (CDM) stands to save enterprises significant time and money and at the same time enhance disaster recovery. CDM software works by capturing a “golden master” copy of production data, and then creating and orchestrating the presentation of

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Analyst Opinion – Time to End Cloud Egress Fees

One of the most common complaints from organizations that have moved at least some workloads to the cloud is the unpredictability of cloud billing, specifically as it relates to egress fees and transactional IO fees. Egress fees are the price

Tagged with: , , , , , ,
Posted in Blog