Blog Archives

What is Ransomware?

Ransomware is one of the biggest threats facing IT. What exactly is ransomware? Ransomware is a program that once installed in a system encrypts an organization’s data and the only way to get it unencrypted is to pay a fee

Tagged with: , , , , , , , ,
Posted in Blog

SlideShare: Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn’t)

If your organization is embarking on a refresh of your primary storage system this year, this is the one webinar that you will want to attend. IT evaluators that haven’t looked at storage in a few years will be impressed

Tagged with: , , , , , , ,
Posted in Slideshare

How to Solve Storage Challenges in Software as a Service (SaaS) Data Centers – Kaminario Briefing Note

The software as a service (SaaS) market is projected to be a $117 billion dollar market by 2019. While most of these solutions incubate in the public cloud, successful SaaS providers reach a point where the disadvantages of renting the

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

StorageShort: Are All-Flash Arrays Really the same Price as Hard Disk Arrays?

A claim that many all-flash vendors are making is they reached price parity with hard disk based arrays. If that is true, then organizations would be crazy to buy any storage system with a hard disk in it. But it

Tagged with: , , , , , , ,
Posted in StorageShort

What are the Advantages of a Purpose-Built Cloud?

Some cloud backup providers are starting to build their own clouds for their purposes. Is that a good idea? Shouldn’t they use more general-purpose cloud providers like Amazon, Google, or Microsoft? What value can be derived from having your backup

Tagged with: , , , , , , ,
Posted in Blog

Is It Time to Modernize NAS?

Network Attached Storage (NAS) systems are the cornerstone of most organization’s storage architectures. For decades they’ve replaced legacy Windows or Linux file servers to provide SMB and NFS access from a single system that can support many more users. But

Tagged with: , , , , , , ,
Posted in Blog

Recovery From Ransomware

Ransomware, or the people who use it, are very successful in both infecting systems and extracting money from the organizations impacted by the infection. Most organizations we speak to face a ransomware infection multiple times per year, so if your

Tagged with: , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,697 other followers

Blog Stats