Blog Archives

Why Protect Data in the Cloud? – Cloud Daddy Briefing Note

The motivation to protect cloud-based applications is different from on-premises applications. Cloud providers like Amazon do a good job of providing a basic level of data protection, including resilience from media failure, snapshots, and multi-cloud replication. The most common cause

Tagged with: , , , , , , ,
Posted in Briefing Note

ChalkTalk Video: How to Scale Up and Scale Out Backup

Organizations are asked to store unprecedented amounts of data. Protection of this data to a secondary storage device and replicating it off-site is critical. For most organizations, the capacity requirements of secondary data, data used for backups and other purposes,

Tagged with: , , , , , , , , ,
Posted in Video

Understanding All-Flash Costs – X-IO Briefing Note

All-flash arrays are quickly becoming the production storage system of choice. Organizations like that all-flash arrays eliminate the need to constantly fine tune the environment to wring out that last little bit of performance. The problem is that flash arrays

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

Why Do Point Products Break Backup

One of the most alarming trends in data protection is the number of different solutions data centers are deploying and managing so they can keep up with the organization’s recovery expectations and budget realities. The demands for rapid recovery are

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Why Backup Breaks and How to Fix it

For most organizations backup, the process of regularly and consistently protecting production data, is fundamentally broken. As a result, these organizations have very little confidence in IT’s ability to recover data at all, let alone promptly. To try to fix

Tagged with: , , , , , , , , , ,
Posted in Blog

Primary Storage Should Secure Itself – RackTop Systems Briefing Note

News of another data breach is becoming all too common of an occurrence. The cost to the organization is not just its reputation but increasingly results in punitive fines. The European Union’s General Data Protection Regulation (GDPR) set a new

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

Meeting the Core Principles of Data Protection

As the data center modernizes, new initiatives and trends are impacting the data protection process. In our webinar, “5 Key Trends that Could Challenge Your Data Protection Plan in 2018,” we discuss how things like Hybrid IT, Ransomware, application explosion,

Tagged with: , , , , , , ,
Posted in Blog

The Big Fail – Why is Enterprise File Sync and Share STILL Failing?

A recent Forrester survey indicated that 56% of enterprise respondents either have implemented an Enterprise File Sync and Share (EFSS) solution or are in the process of installing one. At first glance, that looks good for EFSS vendors. However, on

Tagged with: , , , , , , , ,
Posted in Blog

A Real-World Disaster Recovery Plan – Step 1 – DR Gap Analysis

Disaster Recovery Planning (DRP) doesn’t need to be the lengthy complicated ordeal many make it out to be. In fact, DRP needs to become a more nimble process that is completed quickly, easily updated and frequently tested. The first step

Tagged with: , , , , , , , ,
Posted in Video