Blog Archives

ChalkTalk Video: How to Scale Up and Scale Out Backup

Organizations are asked to store unprecedented amounts of data. Protection of this data to a secondary storage device and replicating it off-site is critical. For most organizations, the capacity requirements of secondary data, data used for backups and other purposes,

Tagged with: , , , , , , , , ,
Posted in Video

Understanding All-Flash Costs – X-IO Briefing Note

All-flash arrays are quickly becoming the production storage system of choice. Organizations like that all-flash arrays eliminate the need to constantly fine tune the environment to wring out that last little bit of performance. The problem is that flash arrays

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

Why Do Point Products Break Backup

One of the most alarming trends in data protection is the number of different solutions data centers are deploying and managing so they can keep up with the organization’s recovery expectations and budget realities. The demands for rapid recovery are

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Why Backup Breaks and How to Fix it

For most organizations backup, the process of regularly and consistently protecting production data, is fundamentally broken. As a result, these organizations have very little confidence in IT’s ability to recover data at all, let alone promptly. To try to fix

Tagged with: , , , , , , , , , ,
Posted in Blog

Primary Storage Should Secure Itself – RackTop Systems Briefing Note

News of another data breach is becoming all too common of an occurrence. The cost to the organization is not just its reputation but increasingly results in punitive fines. The European Union’s General Data Protection Regulation (GDPR) set a new

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

Meeting the Core Principles of Data Protection

As the data center modernizes, new initiatives and trends are impacting the data protection process. In our webinar, “5 Key Trends that Could Challenge Your Data Protection Plan in 2018,” we discuss how things like Hybrid IT, Ransomware, application explosion,

Tagged with: , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,891 other followers

Blog Stats
  • 1,190,262 views