Blog Archives

Product Spotlight: Veeam Availability Orchestrator Version 2

Organizations can no longer count on a “best efforts” disaster recovery strategy. They also can’t afford to take a “recover everything instantly” strategy. IT must balance the recovery requirements of the organization with the realities of the budget to make

Tagged with: , , , , , , , , , , , ,
Posted in Product Spotlight

Solving DR’s Two Biggest Failures – Documentation and Testing with Orchestration

During a disaster, there is a lot that can go wrong, and IT needs to expect the unexpected. In most cases though, it is not the unexpected that causes a disaster recovery (DR) effort to fail. The primary reasons that

Tagged with: , , , , , , , , , , , ,
Posted in Blog

How DR Orchestration Can Improve Success while Lowering Costs

To the organization, all applications are essential, but not all apps are critical. There is a pecking order in terms of what applications need to be back online first. Recovery prioritization is especially crucial during a full-scale disaster where the

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Why DR Orchestration is a Must Have

Disasters rarely strike at a convenient time, like when recovery polices are all up to date, and when there are plenty of IT staff on hand to deal with any issues that may come up. In most cases, the opposite

Tagged with: , , , , , , , , , , ,
Posted in Blog

How Has Ransomware Changed Data Protection?

The ransomware threat can have a significant monetary impact on the business. Not only are enterprises forced to pay the ransom fee to recover their data, but under various government regulations they also may be charged additional fines per impacted

Tagged with: , , , , , , , , , , ,
Posted in Blog

Is it Time for All-Flash Backups?

Businesses today are all about “agile.” For storage professionals, this means delivering ultra-low latency alongside high throughput and high input/output (I/O) operations per second (IOPS) to accelerate mission-critical application performance as much as possible. All-flash storage arrays have solidified their

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

What Constitutes a Complete Data Protection Platform?

Endpoint protection has frequently been treated as an expensive hassle that is not worth it. However, for a number of reasons, organizations can no longer risk leaving employees’ laptops, tablets and other devices unprotected. The major concern is that data

Tagged with: , , , , , , , , , , , , , , ,
Posted in Blog

Breaking Backup with SaaS

Backup is the one process that almost everyone in IT would opt out of if given the choice. In addition to the IT management burden there is often the burden of the infrastructure itself, a never ending need for more

Tagged with: , , , , , , , , , , , , , , , , ,
Posted in Blog