Blog Archives

The Importance of Application Aware Snapshots

An application aware snapshot is one that is taken with the knowledge of an application that is storing its data on the volume. If you need a primer on snapshots, please see our previous blog on the subject. The taking

Tagged with: , , , , , ,
Posted in Blog

DR Ready Storage should Complement Backup

A popular trend is to have data protection begin where the data begins – in primary storage. But the questions are: Should protecting your data be the responsibility of your primary storage product, or should there be a separation between

Tagged with: , , , , , , , ,
Posted in Blog

What is Backup?

Defining backup is both simple and complex. Google says a backup is “the procedure for making extra copies of data in case the original is lost or damaged.” This definition describes the action (extra copies) and the purpose (in case

Tagged with: , , , , , , ,
Posted in Blog

SlideShare: Ransomware – Five Reasons You’re Not As Protected As You Think

Ransomware is the number one threat to an organization’s data. These malware programs infiltrate an organization and encrypt every file they can access. The only way to unencrypt the data is pay a fee to the malware creator. Hence the

Tagged with: , , , ,
Posted in Slideshare

Backups and Users are Enabling Ransomware Success

Ransomware attacks against corporations is such a common problem that it has even made its way into television plots. Both seasons of the popular Mr. Robot television series on USA network focus on a series of ransomware attacks against a

Tagged with: , , , ,
Posted in Blog

Be afraid – very afraid – of Ransomware

If you’re not afraid of ransomware, you either haven’t thought about it or you thought about it enough to be very prepared for it. Ransomware is nothing but an electronic way of stealing money from you or your company, and

Tagged with: , , , ,
Posted in Blog

Webinar: Ransomware – Five Reasons You’re Not As Protected As You Think

Ransomware is the number one threat to an organization’s data. These malware programs infiltrate an organization and encrypt every file they can access. The only way to unencrypt the data is pay a fee to the malware creator. Hence the

Tagged with: , , , ,
Posted in Webinar

Data Protection Advantages of a Thin Provisioned Filer

A thin provisioned filer is a happy filer – especially from a data protection standpoint. In this context a thin provisioned filer is a filer that has plenty of free space due to older unused files moved somewhere else. Unfortunately,

Tagged with: , , , , , , ,
Posted in Blog

All-Flash for Mid-tier Data Center

Exablox Briefing Note Despite the continual decline in the cost of flash, all-flash arrays remain out of reach for many medium sized data centers. They are left trying to band-aid performance problems with server side caching or hybrid arrays instead

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

Raising the Bar on Hyperconvergence, Storage and QoS

Pivot3 Briefing Note IT professionals have a lot of choices to make when they design their next generation infrastructure. They have to choose between a hyperconverged offering that consolidates compute, storage and networking into a single tier or a more

Tagged with: , , , , , , , , , , ,
Posted in Briefing Note