Blog Archives

Embracing Cloud Storage Services for Data Durability and Availability

Legacy storage architectures are notoriously expensive and complex. Factor in the blazing pace at which data growth is accelerating, alongside rising pressure from the business for ubiquitous and always-on data availability, and a new nightmare is brewing for IT –

Tagged with: , , , , , , , , ,
Posted in Blog

Disaster Recovery with Cloud as Primary Storage

The first blog in this series discussed initially using a Cloud as Primary Storage solution for data protection and then in the second blog in the series, transitioning to using the Cloud as Primary Storage to store production data. In

Tagged with: , , , , , , , , ,
Posted in Blog

eBook: Developing a Holistic Storage Security Strategy

The target of most cyber-attacks, like ransomware, is eventually the primary storage system that stores the organization’s most valuable data. If an attacker compromises the organization’s data, they either attempt to restore the data from backups or pay a ransom

Tagged with: , , , , , , , ,
Posted in Blog

Understanding the AWS Data Protection Market – Cloud Daddy Briefing Note

Organizations should keep a backup of applications running on Amazon Web Services (AWS). Unlike on-premises applications where the primary concern is disaster recovery, the primary motivation for protecting cloud-native applications is recovery from cyber-attacks, rogue users or application faults. Each

Tagged with: , , , , , , , ,
Posted in Briefing Note

How to Go All-In with the Cloud as Primary Storage

In our on demand webinar, “Eliminate Backups and Simplify DR with Hybrid Cloud Storage“, we discuss how IT can use the cloud as primary storage to improve their data protection process while dramatically reducing their investments in secondary storage. Since

Tagged with: , , , , , , , , ,
Posted in Blog

Understanding the ROI of Cloud as Primary Storage

As we discussed in our recent webinar, “Eliminate Backups and Simplify DR with Hybrid Cloud Storage,” IT planners can start small, sending backups to the “Cloud as Primary Storage” solution but where the ROI gets powerful is when the organization

Tagged with: , , , , , , , , ,
Posted in Blog

The Evolution of Ransomware – Is Backup Safe?

When ransomware first appeared in data centers, it had a simple attack pattern. Once it landed inside the data center, the malware tried to encrypt every file as fast as possible. If IT didn’t have good backups, the organization was

Tagged with: , , , , , , , ,
Posted in Blog

Making Primary Storage Fulfill the 3-2-1 Rule

The 3-2-1 rule states that an organization should have three copies of data on two different types of media, with IT storing one copy off-site and preferably offline. Traditionally, organizations count on the backup process to meet the 3-2-1 rule’s

Tagged with: , , , , , , , , ,
Posted in Blog

Building a Better Backup Appliance – iXsystems Briefing Note

When it comes to storing backup data, IT professionals have a lot of options from which to choose. Dedicated backup appliances tend to be the most popular selection. Another option is using the backup software’s built-in storage capabilities and building

Tagged with: , , , , , , , ,
Posted in Briefing Note

The Challenges of After-The-Fact Encryption

Encryption is a foundational component of a cyber-secure storage system. The problem is that most organizations implement encryption after-the-fact, months if not years after the initial implementation. When IT is considering a new storage system, they tend to focus on

Tagged with: , , , , , , , ,
Posted in Blog