Blog Archives

How and Why to Protect Against Ransomware

Ransomware is the latest and greatest threat from those wishing to profit from doing harm to data. While it started as a threat to consumer data, it is clearly expanding into a full-on assault against corporate data, which costs companies

Tagged with: , , , , , , , , ,
Posted in Article

Can the SME market automate DR? – Zetta Briefing Note

The Small to Medium Enterprise (SME) market is often overlooked by storage hardware and software vendors. Some vendors focus only on the enterprise customers who need many petabytes of data while other vendors focus only on individuals and the SMB

Tagged with: , , , , , ,
Posted in Briefing Note

What are the Requirements of a Cloud First Strategy?

A Cloud First Strategy means that as an organization brings new applications or services online, it tries to explore the viability of a cloud deployment prior to deploying within a more traditional architecture. Many organizations today are considering a Cloud

Tagged with: , , , , , ,
Posted in Blog

Build your DRaaS

DRaaS is the future of disaster recovery, but leveraging cloud backup may be an expensive way to implement it. Cloud replication, because it is operating on the working set, keeps cloud storage costs contained. The cloud replication software also enables organizations with an IT ready secondary site to leverage that site and create their own DRaaS. In either case, the organization is in control of when and how recovery happens. DRaaS built on replication also enables organizations to use the replication software to enable other cloud initiatives like bursting and test/dev. In this article Storage Switzerland explores the various methods to go about creating and implementing a DRaaS solution.

Tagged with: , , , , , , , , , , ,
Posted in Article

Veeam moves to the Public Cloud: Veeam V9

Veeam has been a leader in the private cloud world for a while now, but in its latest release it set its sights on using the public cloud in the same way their customers have. It is also adding support

Tagged with: , , , , , ,
Posted in Blog

Addressing Modern Recovery Requirements

A Product Analysis of Dell Rapid Recovery It’s time for a new type of backup and recovery because the old ways of backup simply do not meet the current needs of many businesses. It starts with the inefficiencies of how

Tagged with: , , , , , ,
Posted in Product Analysis

Designing Backup to replace Primary Storage

Users and application owners expect that the systems they use will never go down, and if they do they will be returned to operation quickly with little data loss. In our article “Designing Primary Storage to Ease the Backup Burden”

Tagged with: , , , , ,
Posted in Article

The Storage Requirements for 100% Virtualization

After a rapid move from test to production, virtualization of existing servers in many companies seems to slow down. While it is true that most data centers have adopted a virtualize first philosophy, getting those older, mission critical workloads virtualized

Tagged with: , , , , , , ,
Posted in Article

Rubrik Addresses Age Old Backup Problems

The backup and recovery process is complex and brittle. Virtualization has only made the situation worse. To meet the ever increasing demands of their users and application owners IT professionals have been forced to try a never ending parade of

Tagged with: , , , , , , , , , , ,
Posted in Product Analysis

The Challenge of Protecting Next Generation Databases

Database Technology Evolves Beyond Traditional Data Protection For over three decades, relational databases like Oracle, MS-SQL, DB2, MySQL, Sybase, and Informix have been primary databases for core business applications. They are used to store and analyze what used to be

Tagged with: , , , , , , , , , ,
Posted in Briefing Note