Blog Archives

Making Primary Storage Fulfill the 3-2-1 Rule

The 3-2-1 rule states that an organization should have three copies of data on two different types of media, with IT storing one copy off-site and preferably offline. Traditionally, organizations count on the backup process to meet the 3-2-1 rule’s

Tagged with: , , , , , , , , ,
Posted in Blog

Building a Better Backup Appliance – iXsystems Briefing Note

When it comes to storing backup data, IT professionals have a lot of options from which to choose. Dedicated backup appliances tend to be the most popular selection. Another option is using the backup software’s built-in storage capabilities and building

Tagged with: , , , , , , , ,
Posted in Briefing Note

The Challenges of After-The-Fact Encryption

Encryption is a foundational component of a cyber-secure storage system. The problem is that most organizations implement encryption after-the-fact, months if not years after the initial implementation. When IT is considering a new storage system, they tend to focus on

Tagged with: , , , , , , , ,
Posted in Blog

ChalkTalk Video: Ransomware Attacks Backups

Is 3-2-1 for Backup Enough to Protect Against Ransomware? Because many organizations continue to pay ransoms to unlock their data, ransomware continues to become more sophisticated. The malware now attacks backup applications themselves and is infiltrating backup data. In this

Tagged with: , , , , , , , , ,
Posted in Video

The Importance of Consolidation for Secure Storage

The Security Problems with Multi-Vendor Data Storage One of the most common data center trends is storage system sprawl. In today’s data center, every environment or workload has a unique storage architecture. While dispersed storage does allow IT to target

Tagged with: , , , , , , ,
Posted in Blog

What are Ransomware Attack Loops and How to Prevent Them – Asigra Briefing Note

Ransomware is the “new” disaster with which every data center, regardless of location, needs to be concerned. IT must take steps to protect the organization’s data, and even its brand from ransomware. A successful defense against ransomware requires user training

Tagged with: , , , , , , , ,
Posted in Briefing Note

How to Protect the Entire Hybrid Cloud – Druva Briefing Note

Most organizations use the cloud in a hybrid manner. Some applications and workloads remain on-premises, while some are transitory between on-premises and the cloud, and still others are cloud only. The distributed IT model puts a new strain on the

Tagged with: , , , , , , , , , , ,
Posted in Briefing Note

Rethinking the Role of Enterprise Data Protection – IBM Briefing Note

Enterprise backup is at times a behemoth. While it does provide the data center a foundational level of protection, the solutions tend to be slow to adopt new environments and too heavy-handed to solve specific feature requests. As a result,

Tagged with: , , , , , , ,
Posted in Briefing Note

Webinar: Five Steps To Lowering Your Storage Costs Without Sacrificing Performance

Storage today, especially high performance production storage, costs too much. The cost of production storage forces customers to make compromises with their data so that the purchase will fit into their budget. The cost problem defies reality. Storage, both in

Tagged with: , , , , , , , , , ,
Posted in Webinar

Hyperconvergence is NOT Backup

One of the riskiest claims a vendor ever makes is “we’ve eliminated the need for backup” and hyperconverged infrastructure (HCI) vendors make this claim frequently. Good data resiliency is not good backup, and in fact, some of the work that

Tagged with: , , , , , , , , , ,
Posted in Blog