Blog Archives

Performance vs. Security vs. Management – How to Solve the Primary Storage Paradox

Applications and users demand unprecedented levels of performance, cyber-threats like ransomware require new levels of security and access control, and organizations are intolerant of any form of downtime or data loss. At the same time, they need to manage data

Tagged with: , , , , , , , , , ,
Posted in Article

Cyber-Secure Storage Requires More Than Encryption

Encryption is a fundamental element of building a secure storage system, but organizations need more than just encryption. Encryption works when the outside attacker can’t authenticate themselves, but if the outside attacker can compromise a user or admin account, then

Tagged with: , , , , , , ,
Posted in Blog

Should You Protect Unstructured Data Differently?

The focus of backup is now on unstructured data instead of databases. Indeed, protection of databases is as important as it ever has been, but the backup process is probably not the right way to protect that data. Organizations have

Tagged with: , , , , , , ,
Posted in Blog

Three Steps to Moving Legacy Backups to the Cloud

One of the significant challenges regarding data protection is managing its data set. Secondary storage tiers store five to ten times as much data as production data stores and can overwhelm the data center. IT planners are looking to cloud

Tagged with: , , , , , , , , ,
Posted in Blog

Fixing the Broken Archive – Archive360 2018 Update

Data Management (archiving) looks good on the IT whiteboard. It is the process of moving old data from existing primary storage systems to an archive system. The process should free up primary storage capacity, simplify the data protection process and

Tagged with: , , , , , ,
Posted in Briefing Note

How to Leverage the Cloud for Unstructured Data Protection

Unstructured data is growing at alarming rates. The growth is the result of not only increased user activity but also by machines and IoT devices. Re-creation of this data isn’t possible. It is a point time capture of sensory data.

Tagged with: , , , , ,
Posted in Blog

Are Snapshots Enough to Protect Unstructured Data?

Unstructured data is hard to protect. It is growing at alarming rates. It is a crucial target of cyber-threats like ransomware. Even the makeup of the data is problematic. Unstructured data is often made up of millions, and in some

Tagged with: , , , , , ,
Posted in Blog