Blog Archives

ChalkTalk Video: Can Disk Backups Have An “Air Gap?”

Ransomware is changing everyone’s thoughts about how backups should work. Put another way, many of the old ideas about backups are now back in vogue. One of those ideas is the 3-2-1 rule. It says enterprises should have three copies

Tagged with: , , , , , , , , , , ,
Posted in Video

ChalkTalk Video: Using the 3-2-1 Rule To Protect Against Ransomware

Protection in the modern data center is changing. IT must provide backup to disk and an instant recover capability to meet the recovery expectations of application owners. But this rapid protection also puts data at risk to a ransomware attack.

Tagged with: , , , , , , , , , , ,
Posted in Video

How To Create an Always Predictable Data Center

The modern data center must not only be predictable for normal production operations but also in failed state situations. An “Always Predictable” storage architecture is key to enabling IT to meet the various service levels the organization requires. The Predictable

Tagged with: , , , , , , , , ,
Posted in Blog

Is your Windows Backup Server at Risk of Ransomware?

Your Windows-based backup server may be at risk to ransomware. That was the take away from a recent talk on ransomware at the VeeamOn conference in New Orleans. A ransomware attack could either begin at your Windows-based backup server or

Tagged with: , , , , , ,
Posted in Blog

What is the Data Protection Problem?

Users demand a seamless digital experience. When something goes wrong they expect their data and applications to quickly return, preferably without them ever knowing something went wrong in the first place. For IT this seamless expectation means data has to

Tagged with: , , , , , , , ,
Posted in Blog

Is There Value in Converged Data Protection?

The idea of a single platform offering computing, network, and storage services with integrated data protection sounds almost utopian. What could be better than all aspects of computing already built into the system that you buy? Systems integrating functions like

Tagged with: , , , , , , , , , ,
Posted in Article

Should Backup Software Companies Build an Appliance?

A little over 15 years ago we started to see the creation of the backup appliance market with the creation of the deduplication backup target appliance. Since that time, we’ve gone from having no backup appliances to having so many

Tagged with: , , , , , , , , ,
Posted in Article