Blog Archives

MeetTheCEO: Actifio’s Ash Ashutosh

Enterprises are dealing with a constant tide of copy data sprawl. More copies are being created to serve secondary business processes like analytics, test and development, and frequently with limited oversight or governance from IT. Meanwhile, regulations like the European

Tagged with: , , , , , , , , ,
Posted in Webinar

What the Enterprise Needs in SaaS Data Protection

Secondary storage is quickly consuming the data center and becoming too complex to manage. The copy data stored on those secondary systems is distributed across multiple enterprise and cloud storage locations. The secondary data set is being used for a

Tagged with: , , , , , , , , , , , , , , , , ,
Posted in Blog

You Will be Breached – What’s Next for Recoverability?

As ransomware variants grow in number and sophistication, it is practically inevitable that enterprises will be breached. Users are becoming more aware, but eventually there will be some users in the enterprise that click on something they shouldn’t. At the

Tagged with: , , , , , , , , , ,
Posted in Blog

Cloud Endpoint Protection: Potential Pitfalls to Avoid

Backing up endpoint data is no longer a nice-to-have. Leaving endpoints unprotected leaves critical enterprise data vulnerable to malware, deletion, theft or corruption, and to running afoul of data privacy regulations. This can quickly result in a tarnished brand reputation,

Tagged with: , , , , , , , , , ,
Posted in Blog

What is the Best Way to Store Inactive Data?

In today’s data deluge, it is a challenge for IT professionals to get a comprehensive and confident grasp on all of the data that their organization is storing – never mind how that data is actually being used. The reality

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Infinidat Introduces Elastic Data Fabric

More Efficient NVMe-oF at Enterprise Scale For large enterprises, data stores continue to grow into the petabytes (PB), and increasingly need to operate across on-premises infrastructure and cloud services in order to balance cost, control and performance needs. Meanwhile, the

Tagged with: , , , , , , , , , , ,
Posted in Briefing Note

How to Make Data Archiving Easier Than Expanding Primary Storage

Most IT professionals will admit that most of their data is inactive and hasn’t been accessed in years. Storage Switzerland finds that over 80% of the data in most data centers falls into this category. There are viable solutions to

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Overcoming Shortcomings of SaaS Based Data Protection

Most organizations don’t make money off their data protection process; instead they view it as an insurance policy in case something goes wrong. These organizations, however, do make sporadic investments in the data protection infrastructure and these investments consume a

Tagged with: , , , , , , , , , , ,
Posted in Blog

Three Key Steps to Endpoint Protection

In a world where data is only becoming more critical to the business, many enterprises look over the fact that endpoints are the weak link when it comes to data protection and availability. Data does not only live in the

Tagged with: , , , , , , , , , ,
Posted in Blog

What is Data Center Transformation?

“IT transformation” is among the most commonly-used (and arguably the most over-used) term in the industry today, but no matter how you define it, one thing is clear: almost universally, enterprises are revamping their IT infrastructure to better meet modern

Tagged with: , , , , , , , , , , , ,
Posted in Blog