Blog Archives

Cloud NAS vs. Large Files – How Cloud NAS can Win

Many Cloud NAS solutions leverage a local cache to get around the latency problem when retrieving data from the cloud. If the requested file is on the local cache the user will notice no performance difference than before they had

Tagged with: , , , , , ,
Posted in Blog

SlideShare: Three Reasons Why Object Storage is the Best Defense against Ransomware Attacks

Backups, by themselves, are not an effective defense against a ransomware attack. The systems that store backup data also require protection, but backup storage is as vulnerable to a ransomware attack as production data, if not more so. If both

Tagged with: , , , , , , , ,
Posted in Slideshare

Unstructured Data Has Changed – Has Your Protection Strategy?

Unstructured data is easily the largest data set in the enterprise today and what makes up that data set has changed dramatically over the past ten years. What used to be relatively few and small files created by users are

Tagged with: , , , ,
Posted in Blog

Managing Data to Manage Ransomware

One of the reasons that data centers are so vulnerable to ransomware attacks is the amount of data that remains accessible on production storage. The reality is that most of this data does not need to be there. Investing in

Tagged with: , , , , , , , ,
Posted in Blog

Live Webinar: The Three New Requirements of Unstructured Data Protection – Can your backup deliver?

Because of the ability to mine it for information, unstructured data is becoming the most valuable data asset that many organizations have. The more unstructured data an organization has, the greater its value to the organization becomes. The growth in

Tagged with: , , , ,
Posted in Webinar

Webinar: Three Reasons Why Object Storage is the Best Defense against Ransomware Attacks

Backups, by themselves, are not an effective defense against a ransomware attack. The systems that store backup data also require protection, but backup storage is as vulnerable to a ransomware attack as production data, if not more so. If both

Tagged with: , , , , , , , ,
Posted in Webinar

Meeting the Five Unstructured Data Backup Requirements

In the last blog, we laid out the five requirements for unstructured data protection; fine-grained backups, frequent and rapid backups; cloud support, data classification, and an archiving future. Aparavi is one of the first data protection companies specifically focused on

Tagged with: , , , , , , ,
Posted in Blog

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,864 other followers

Blog Stats
  • 1,169,916 views