Blog Archives

The Value of High Focused Data Protection – HYCU Backup for Nutanix

Anytime an enterprise considers a new platform it has to address one particular requirement; how exactly IT will protect the new platform. If the platform promises enough value, IT may forgo that requirement and cobble together a “best efforts” data

Tagged with: , , , , , , , , , , , ,
Posted in Briefing Note

How to Provide Rapid Recovery for Mission-Critical Applications

When mission-critical applications go down, bad things happen. Organizations lose revenue, users and customers are dissatisfied. IT loses its reputation and sometimes even their jobs. There is no arguing that these applications need to be protected regularly and recovered quickly.

Tagged with: , , , , , , , , , ,
Posted in Blog

SlideShare: Hitting Your Data Protection Sweet Spot

The data protection process sometimes has objectives that seem to be in opposition to one another. On one side, the organization needs rapid and frequent data captures so that RPOs and RTOs are met. On the other side, there is

Tagged with: , , , , , , , , , ,
Posted in Slideshare

How to Implement Replication for Rapid Recovery

For organizations needing to protect mission-critical critical systems, software-based replication is an ideal way to meet and potentially exceed expectations. In fact, replication can be implemented so cost effectively that the scope of coverage can extend beyond mission-critical systems and

Tagged with: , , , , , , , , , ,
Posted in Blog

StorageShort: Disaster Recovery – Secondary Site vs. Public Cloud

During a disaster everyone needs a place to go, including an organization’s applications and data. Ideally that “place” is prepared. For decades the only real decision for IT was just how prepared would the DR site be? Options ranged from

Tagged with: , , , , , , , , , ,
Posted in StorageShort

Software vs. Hardware Replication

As discussed in our last entry, replication is an ideal way for most organizations to meet the data protection and data recovery demands of their mission critical applications. But there is a choice that IT needs to make when selecting

Tagged with: , , , , , , , ,
Posted in Blog

How to Protect Mission Critical Applications

While they should only represent a small percentage of your environment, mission critical applications need the most attention when designing a protection process for them. Most of these applications can only be down for a few minutes and can only

Tagged with: , , , , , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,697 other followers

Blog Stats
  • 1,018,403 views