Blog Archives

Do Nutanix Customers Need a Backup Solution? – Comtrade HYCU Briefing Note

Nutanix customers find themselves in an interesting situation. On one hand, they have a scale out hyperconverged infrastructure system that has helped many people expand their virtualization environment. But some Nutanix customers find themselves in need of a backup solution.

Tagged with: , , , , , , ,
Posted in Briefing Note

How to Design Self-Service Storage – ioFABRIC Briefing Note

For application owners, storage is an overly complicated ordeal that they must go through in order to get applications up and performing well. Ideally, application owners should be masked from the complexity of the infrastructure. They shouldn’t care which storage

Tagged with: , , , , , , , , , , ,
Posted in Briefing Note

How To Create an Always Predictable Data Center

The modern data center must not only be predictable for normal production operations but also in failed state situations. An “Always Predictable” storage architecture is key to enabling IT to meet the various service levels the organization requires. The Predictable

Tagged with: , , , , , , , , ,
Posted in Blog

iXsystems’ New TrueNAS X10 and FreeNAS v11.0 Briefing Note

The software defined data center does not mean data centers are free from vendor lock-in. It just means vendors moved the lock from hardware to software. While the software may (not always) provide the organization the ability to mix and

Tagged with: , , , , , , , , , , , , , ,
Posted in Briefing Note

The Art of Eliminating Downtime to Achieve High Availability

Downtime, no matter what the cause, is becoming less acceptable to organizations of all sizes. Clearly, technology exists that can eliminate it. But with the reduction or elimination of downtime, the associated costs – when compared to once-per-night backups –

Tagged with: , , , , , , , ,
Posted in Article

Why Not Build Ransomware Proof Storage?

The best way to protect an organization from a ransomware attack is at its source, primary storage. Ransomware works by compromising a user account and then encrypting all the files that the account can access. A compromised superuser account is

Tagged with: , , , , , , , ,
Posted in Blog

Ransomware – How To Create a Proactive Protection File Strategy

IT needs a proactive way to stop ransomware. It’s here to stay. Most ransomware countermeasures are reactive. The damage is done before IT can deploy their reactive countermeasures. When ransomware gets through an organization’s defenses, it starts to encrypt data,

Tagged with: , , , , , , ,
Posted in Article

How To Beat Ransomware But Not Your Budget

The solution to ransomware is real-time data protection. The moment data changes it needs to be copied to a secondary storage system and sequestered from primary storage. Then, if a ransomware virus attacks, the last known good copy can be

Tagged with: , , , , , , ,
Posted in Blog

Why Backups Can’t Protect Against Ransomware

Ransomware is a new type of threat. As a result it needs a new type of defense. The reason is simple: Backups are not enough to protect against ransomware. They are increasingly victims of the attack themselves, and they don’t

Tagged with: , , , , , , ,
Posted in Blog

What is Ransomware?

Ransomware is one of the biggest threats facing IT. What exactly is ransomware? Ransomware is a program that once installed in a system encrypts an organization’s data and the only way to get it unencrypted is to pay a fee

Tagged with: , , , , , , , ,
Posted in Blog