Blog Archives

What to Look for in Cloud Native Backup

Users and software vendors realize the importance of protecting cloud-native applications. While cloud providers generally do an excellent job of protecting applications from a disaster they don’t provide easy access to tools to provide point-in-time backups which are necessary to

Tagged with: , , , , , , , , , ,
Posted in Blog

Bringing Tier 0 in From the Lunatic Fringe – Violin Systems Briefing Note

In most data centers, Tier 1 production storage has evolved from high-end hard disk-based systems to hybrid systems supported by flash to all-flash arrays. These Tier 1 systems are also typically well equipped with enterprise features like snapshots, replication and

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

Do You Need to Backup Cloud Native Applications?

A common question from organizations with cloud native applications is do they need to back those applications up? The cloud, after all provides plenty of redundancy and all major cloud providers have multiple data centers at their disposal. Most providers

Tagged with: , , , , , , , , , ,
Posted in Blog

Don’t Forget Data Protection When Selecting Cloud Providers

The cloud is good at availability and data durability. If there is an outage cloud providers have an excellent track record of getting their services back online quickly and providing access to the latest copy of data. What if though,

Tagged with: , , , , , , ,
Posted in Blog

Breach – Preparing Cyber-Secure Storage for the Inevitable

The goal of cyber-secure storage is to eliminate attempts to breach an organization’s storage and access its data. The prior three blogs describe methods IT can take to better protect the organization’s data assets; however, despite all the best efforts,

Tagged with: , , , , , , , ,
Posted in Blog

How to Protect Applications Running in Google Cloud – HYCU Software Briefing Note

When they are migrating or creating cloud-native applications, organizations need to consider how best to protect those applications. Most cloud providers provide very good high availability but don’t provide robust point-in-time recovery capabilities. Recovery from data corruption, user error and

Tagged with: , , , , , , , ,
Posted in Briefing Note

Cyber-Secure Storage Requires More Than Encryption

Encryption is a fundamental element of building a secure storage system, but organizations need more than just encryption. Encryption works when the outside attacker can’t authenticate themselves, but if the outside attacker can compromise a user or admin account, then

Tagged with: , , , , , , ,
Posted in Blog

Should You Protect Unstructured Data Differently?

The focus of backup is now on unstructured data instead of databases. Indeed, protection of databases is as important as it ever has been, but the backup process is probably not the right way to protect that data. Organizations have

Tagged with: , , , , , , ,
Posted in Blog

Simpler is Better – Solving Rack Scale Storage Problems – DriveScale Briefing Note

The storage infrastructure for multi-rack scale applications like Hadoop Spark, Cassandra, and CouchBase, are typically built using directly attached flash-based storage instead of a shared flash array. The motivation for using direct-attached storage (DAS) is simple. Media inside a server

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

Are Snapshots Enough to Protect Unstructured Data?

Unstructured data is hard to protect. It is growing at alarming rates. It is a crucial target of cyber-threats like ransomware. Even the makeup of the data is problematic. Unstructured data is often made up of millions, and in some

Tagged with: , , , , , ,
Posted in Blog