Blog Archives

Why Do Point Products Break Backup

One of the most alarming trends in data protection is the number of different solutions data centers are deploying and managing so they can keep up with the organization’s recovery expectations and budget realities. The demands for rapid recovery are

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Why Backup Breaks and How to Fix it

For most organizations backup, the process of regularly and consistently protecting production data, is fundamentally broken. As a result, these organizations have very little confidence in IT’s ability to recover data at all, let alone promptly. To try to fix

Tagged with: , , , , , , , , , ,
Posted in Blog

Primary Storage Should Secure Itself – RackTop Systems Briefing Note

News of another data breach is becoming all too common of an occurrence. The cost to the organization is not just its reputation but increasingly results in punitive fines. The European Union’s General Data Protection Regulation (GDPR) set a new

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

Meeting the Core Principles of Data Protection

As the data center modernizes, new initiatives and trends are impacting the data protection process. In our webinar, “5 Key Trends that Could Challenge Your Data Protection Plan in 2018,” we discuss how things like Hybrid IT, Ransomware, application explosion,

Tagged with: , , , , , , ,
Posted in Blog

The Big Fail – Why is Enterprise File Sync and Share STILL Failing?

A recent Forrester survey indicated that 56% of enterprise respondents either have implemented an Enterprise File Sync and Share (EFSS) solution or are in the process of installing one. At first glance, that looks good for EFSS vendors. However, on

Tagged with: , , , , , , , ,
Posted in Blog

A Real-World Disaster Recovery Plan – Step 1 – DR Gap Analysis

Disaster Recovery Planning (DRP) doesn’t need to be the lengthy complicated ordeal many make it out to be. In fact, DRP needs to become a more nimble process that is completed quickly, easily updated and frequently tested. The first step

Tagged with: , , , , , , , ,
Posted in Video

Ransomware: The Problem with Paying the Ransom

When ransomware hits an organization, it is very tempting simply to pay the ransom instead of going through the time and effort to replace the encrypted data by recovering from a backup. After paying the ransom, the hackers give a

Tagged with: , , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,804 other followers

Blog Stats