Blog Archives

The Requirements of a Modern Data Protection Architecture

Previously, Storage Switzerland wrote about the challenges of trying to meet modern data protection requirements with legacy technologies, including the inability to scale-out and limited cloud integration. We also discussed the pros and cons of new backup appliances and converged

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Why Current Data Protection Architectures Miss the Mark

In response to the increased need for rapid recovery, longer data retention and the desire to support the cloud for vaulting and disaster recovery, alternative solutions are appearing on the market to try and correct the shortcomings of legacy architectures.

Tagged with: , , , , , , , , , ,
Posted in Blog

Is Your Data Protection Architecture Holding You Back?

In most organizations the data protection architecture has gone unchanged for almost a decade. It’s true that certain components within the architecture change because of technological advances or forced refreshes but the basic design remains the same. The challenge with

Tagged with: , , , , , , , , , , ,
Posted in Blog

Understanding Gartner’s Object Storage Quadrant

Analyst firm Gartner released its latest version of its Magic Quadrant for object storage that attempts to rank and organize the distributed file system and object storage system market. Instead, it really creates more questions and confusion instead of providing

Tagged with: , , , , , , , , , , , , , , , , , , , ,
Posted in Blog

StorageSwiss Podcast: Analysis, Product Briefings, Deep Dive on Google vs. Amazon Cloud Storage

Listen to our latest podcast where we provide analysis on the latest news like: Carbonite buying DoubleTake Violin Memory being bought at auction StorageCraft buying Exablox Datto buying OpenMesh We also review our recent briefings including: Talon Vembu Actifio Zoolz

Tagged with: , , , , , , , , , , , , , ,
Posted in Podcast

Backup Software, Hardware Integration Challenges – StorageCraft Buys Exablox

Data protection is made of three components; the software that identifies and copies the data needing protection, the hardware that will store the protected copy and the IT professionals that drive the process. When two of these components are combined,

Tagged with: , , , , , ,
Posted in Briefing Note