Blog Archives

Why is Operational Recovery Needed?

The reason backup strategies exist is to ensure operational continuity after someone makes a mistake, purposefully corrupts data, or hardware or software component runs afoul. Operational recovery is the day-to-day reason you backup data. It is the recovery of specific

Tagged with: , , , , , ,
Posted in Blog

New Threats Require Better DR – CloudEndure Briefing Note

Despite the rising concerns over cyber-attacks like ransomware, humans are still the number one cause of disasters. We need to look no further than the Amazon “typo error” of 2017 that knocked out service on AWS for proof. According to

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

How SMBs Can Have Enterprise Class DP without Breaking the Bank? – BackupAssist 10 Briefing Note

Small to medium sized businesses (SMBs) often lack a good backup and recovery strategy, and often do not realize the difference between archive and disaster recovery. They find quality data protection (DP), data retention and disaster recovery difficult to obtain

Tagged with: , , , , , , , , , , , , , , ,
Posted in Briefing Note

Testing is the Key to Ransomware Success

IT’s goal should be to never pay a ransom as a result of a ransomware attack. To achieve that goal requires prevention, preparation and practice. Unfortunately, practice is the element most overlooked but potentially the most critical. Why Ransomware Testing

Tagged with: , , , , , ,
Posted in Blog

StorageShort – Ransomware 101

Ransomware is capturing more than its fair share of headlines. In this StorageShort, George Crump, Lead Analyst at Storage Switzerland, and Gregg Ogden, Solutions Marketer at Commvault, discuss what ransomware is and what makes it different from other disasters that

Tagged with: , , , , ,
Posted in StorageShort

ChalkTalk Video: Practicing For Ransomware

A successful ransomware attack is a disaster like none other. Much of the environment is probably still up, especially applications. But an important part of it, user files, may be down. And there is a tempting shortcut: Pay the ransom

Tagged with: , , , , ,
Posted in Video

SlideShare: How to “Future Proof” Data Protection for Organizational Resilience

Users expectations of IT’s ability to return mission critical applications to production are higher than ever. These expectations are leading IT to abandon many of their backup and recovery solutions to try new, unproven solutions that may or may not

Tagged with: , , , , , , , , ,
Posted in Slideshare

iXsystems’ New TrueNAS X10 and FreeNAS v11.0 Briefing Note

The software defined data center does not mean data centers are free from vendor lock-in. It just means vendors moved the lock from hardware to software. While the software may (not always) provide the organization the ability to mix and

Tagged with: , , , , , , , , , , , , , ,
Posted in Briefing Note

Is There Value in Converged Data Protection?

The idea of a single platform offering computing, network, and storage services with integrated data protection sounds almost utopian. What could be better than all aspects of computing already built into the system that you buy? Systems integrating functions like

Tagged with: , , , , , , , , , ,
Posted in Article

ChalkTalk Video: Your DR Plan Needs Three Buckets

All applications are not the same but most organization treat them that way. The problem with treating all application equally is it increases the cost of your disaster recovery effort and, in most cases, decreases your ability to meet expectations.

Tagged with: , , , , , , , , ,
Posted in Video