Blog Archives

How to Provide Rapid Recovery for Mission-Critical Applications

When mission-critical applications go down, bad things happen. Organizations lose revenue, users and customers are dissatisfied. IT loses its reputation and sometimes even their jobs. There is no arguing that these applications need to be protected regularly and recovered quickly.

Tagged with: , , , , , , , , , ,
Posted in Blog

How to Improve your Recovery Confidence

Most organizations have very low confidence in their ability to consistently recover data, whether from a minor outage or a major disaster. They’ve been through too many instances where data could not be recovered, took too long to be recovered,

Tagged with: , , , , , , , ,
Posted in Blog

SlideShare: Hitting Your Data Protection Sweet Spot

The data protection process sometimes has objectives that seem to be in opposition to one another. On one side, the organization needs rapid and frequent data captures so that RPOs and RTOs are met. On the other side, there is

Tagged with: , , , , , , , , , ,
Posted in Slideshare

Beating the VMware Tax – Maxta Briefing Note

The term VMware Tax was a derogatory description of a change in VMware licensing a few years ago that charged users based on the amount of vRAM they used. VMware, after public outcry, dropped that policy. The term is now

Tagged with: , , , , , , ,
Posted in Briefing Note

Can You Backup a Nutanix Cluster to Amazon S3? – Comtrade Software Briefing Note

Data centers of all types are increasingly trying to figure out how to store backups in the cloud. VMware and Hyper-V customers have a variety of options for doing this, but Nutanix customers using the Acropolis Hypervisor (AHV) have historically

Tagged with: , , , , , ,
Posted in Briefing Note

How to Implement Replication for Rapid Recovery

For organizations needing to protect mission-critical critical systems, software-based replication is an ideal way to meet and potentially exceed expectations. In fact, replication can be implemented so cost effectively that the scope of coverage can extend beyond mission-critical systems and

Tagged with: , , , , , , , , , ,
Posted in Blog

Webinar: 3 Steps to Stop Data Protection Sprawl

Most enterprises have little confidence in their ability to recover data in the event of a data center failure, storage failure, ransomware attack, or natural disaster. There is too much data to protect and user expectations of rapid recovery are

Tagged with: , , , , , , , ,
Posted in Webinar

StorageShort: Disaster Recovery – Secondary Site vs. Public Cloud

During a disaster everyone needs a place to go, including an organization’s applications and data. Ideally that “place” is prepared. For decades the only real decision for IT was just how prepared would the DR site be? Options ranged from

Tagged with: , , , , , , , , , ,
Posted in StorageShort

Software vs. Hardware Replication

As discussed in our last entry, replication is an ideal way for most organizations to meet the data protection and data recovery demands of their mission critical applications. But there is a choice that IT needs to make when selecting

Tagged with: , , , , , , , ,
Posted in Blog

How to Protect Mission Critical Applications

While they should only represent a small percentage of your environment, mission critical applications need the most attention when designing a protection process for them. Most of these applications can only be down for a few minutes and can only

Tagged with: , , , , , , , , , , ,
Posted in Blog