Blog Archives

Performance vs. Security vs. Management – How to Solve the Primary Storage Paradox

Applications and users demand unprecedented levels of performance, cyber-threats like ransomware require new levels of security and access control, and organizations are intolerant of any form of downtime or data loss. At the same time, they need to manage data

Tagged with: , , , , , , , , , ,
Posted in Article

Cyber-Secure Storage Requires More Than Encryption

Encryption is a fundamental element of building a secure storage system, but organizations need more than just encryption. Encryption works when the outside attacker can’t authenticate themselves, but if the outside attacker can compromise a user or admin account, then

Tagged with: , , , , , , ,
Posted in Blog

Should You Protect Unstructured Data Differently?

The focus of backup is now on unstructured data instead of databases. Indeed, protection of databases is as important as it ever has been, but the backup process is probably not the right way to protect that data. Organizations have

Tagged with: , , , , , , ,
Posted in Blog

Three Steps to Moving Legacy Backups to the Cloud

One of the significant challenges regarding data protection is managing its data set. Secondary storage tiers store five to ten times as much data as production data stores and can overwhelm the data center. IT planners are looking to cloud

Tagged with: , , , , , , , , ,
Posted in Blog

Fixing the Broken Archive – Archive360 2018 Update

Data Management (archiving) looks good on the IT whiteboard. It is the process of moving old data from existing primary storage systems to an archive system. The process should free up primary storage capacity, simplify the data protection process and

Tagged with: , , , , , ,
Posted in Briefing Note

How to Leverage the Cloud for Unstructured Data Protection

Unstructured data is growing at alarming rates. The growth is the result of not only increased user activity but also by machines and IoT devices. Re-creation of this data isn’t possible. It is a point time capture of sensory data.

Tagged with: , , , , ,
Posted in Blog

Are Snapshots Enough to Protect Unstructured Data?

Unstructured data is hard to protect. It is growing at alarming rates. It is a crucial target of cyber-threats like ransomware. Even the makeup of the data is problematic. Unstructured data is often made up of millions, and in some

Tagged with: , , , , , ,
Posted in Blog

Why Protect Data in the Cloud? – Cloud Daddy Briefing Note

The motivation to protect cloud-based applications is different from on-premises applications. Cloud providers like Amazon do a good job of providing a basic level of data protection, including resilience from media failure, snapshots, and multi-cloud replication. The most common cause

Tagged with: , , , , , , ,
Posted in Briefing Note

The Problem with Using Cloud Storage for Long-Term Data Retention – Nexsan Briefing Note

Compared to on-premises archive storage the cloud seems like an ideal place to archive data. An organization can start small, grow incrementally and only pay for the storage they are using. There is a crossover point however where it is

Tagged with: , , , , , , , ,
Posted in Briefing Note

Unstructured Data Backup and GDPR

Because of its sheer size, both in capacity and number of files, protecting unstructured data is a top concern for many organizations. The European Union’s General Data Protection Regulation (GDPR) as well as the growing concern over data privacy worldwide

Tagged with: , , , , ,
Posted in Blog