Blog Archives

Unstructured Business Continuity

When IT planners think of business continuity they often think of databases and applications the organization needs to sustain operations. But what about unstructured data? Does unstructured data need the same level of business continuity that structured data does? How

Tagged with: , , , , , , , , ,
Posted in Blog

SlideShare: Overcoming the Top 3 Challenges of the Storage Status Quo

Between 2010 and 2020, IDC predicts that the amount of data created by humans and enterprises will increase 50x. Legacy network attached storage (NAS) systems can’t meet the unstructured data demands of the mobile workforce or distributed organizations. In this

Tagged with: , , , , , , ,
Posted in Slideshare

Speed is Critical For Ransomware Recovery

Speed of recovery from any disaster is always important, but it is most critical in terms of recovering from a ransomware attack. Most ransomware fees are typically a few thousand dollars, and are rarely more than $20,000. For the organization,

Tagged with: , , , , , , , , ,
Posted in Blog

Why Windows File Server Archive ROIs are Broken

Windows file server archiving is the process of getting all the old data off of an organization’s Windows file servers and moving them to some less expensive form of storage. The concept has been around almost since there were Windows

Tagged with: , , , , , , , , ,
Posted in Blog

Webinar: Overcoming the Top 3 Challenges of the Storage Status Quo

Between 2010 and 2020, IDC predicts that the amount of data created by humans and enterprises will increase 50x. Legacy network attached storage (NAS) systems can’t meet the unstructured data demands of the mobile workforce or distributed organizations. In this

Tagged with: , , , , , , ,
Posted in Webinar

How to Stop Ransomware Before The Damage Is Done

NTP Software Defendex™ Product Analysis Ransomware is, for good reason, top of mind right now. Most strategies under discussion now are actually responses, not analysis and elimination. And, because ransomware is such a profitable “business,” new versions will continue to

Tagged with: , , , , , , , , ,
Posted in Blog

ChalkTalk Video: WannaCry, Snowden, Wikileaks… Is Your Data Next?

When IT defenses are compromised, the organization faces one of two challenges. Either the data is encrypted by a ransomware attack or it is copied to the attacker’s servers. In the first case, assuming data protection is in place and

Tagged with: , , , , , , , , ,
Posted in Video