Blog Archives

ChalkTalk Video: Why is Recovery From Ransomware So Hard?

Recovery from ransomware is different from any other type of recovery. Most are single file restores caused by a user mistakenly deleting a file. At the other end of the spectrum is a complete server or application recovery, where you

Tagged with: , , , , ,
Posted in Video

StorageShort: How To Classify Your Applications for DR

Storage Switzerland’s W. Curtis Preston suggests in a recent video the key to a successful DR plan is classifying your applications into recovery buckets or priorities. But how exactly do you determine which applications should go into which bucket? In

Tagged with: , , , , , , , , ,
Posted in StorageShort

Exploiting Ransomware’s Fatal Flaw

Ransomware has one fatal flaw. Organizations that know how to exploit this flaw can almost eliminate this cyber-attack from their list of concerns. Ironically the flaw is found in their very action it takes to hold organizations hostage – it

Tagged with: , , , , , ,
Posted in Blog

Webinar: 15 Minute Ransomware Survival Guide

Ransomware is a new threat, and new threats require new strategies. Within the first 15 minutes this webinar will provide you key strategies for surviving a ransomware attack. During the event Storage Switzerland and Commvault cover the three P’s of

Tagged with: , , , , ,
Posted in Webinar

Why Not Have your Backup System Provide CDM? – Unitrends Briefing Note

If the updates coming out of the various backup software companies are any indication, copy data management (CDM) and instant recovery are mainstream features. In addition, some backup software products are finally starting to recognize the importance of creating and

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Is Mutual Mystification Part of your Disaster Recovery Plan?

It is impossible for all applications to be recovered instantly with no data loss after a disaster. But that is exactly what users expect. We find in some organizations IT avoids having the necessary conversation that brings users and application

Tagged with: , , , , , , , , , , ,
Posted in Blog

Virtual Instruments – Realizing Full Value of Your EMC Storage Deployments

One request I never hear from IT professionals is give me more tools. They are inundated with tools from every vendor in their environment. Every component in the data center generates data about how it’s operating. The problem is none

Tagged with: , , , , ,
Posted in Blog

What Should you Expect from Disk Backup in 2017?

You need more than a network share and deduplication to stand out among the disk backup crowd in 2017. Things have come a long way since disk backup targets started appearing 17 years ago. The table stakes may still be

Tagged with: , , , , , , ,
Posted in Blog