Blog Archives

File Servers; Is It Time to Say Goodbye?

Unstructured data is the fastest-growing segment of data in the data center. A significant portion of data within unstructured data is the data that users create though office productivity and other specialized applications. User data also often represents the bulk

Tagged with: , , , , , , , , , ,
Posted in Briefing Note

Cloud Endpoint Protection: Potential Pitfalls to Avoid

Backing up endpoint data is no longer a nice-to-have. Leaving endpoints unprotected leaves critical enterprise data vulnerable to malware, deletion, theft or corruption, and to running afoul of data privacy regulations. This can quickly result in a tarnished brand reputation,

Tagged with: , , , , , , , , , ,
Posted in Blog

Creating an Endpoint Backup Strategy that Works for Everyone

Backing up endpoints is a crucial aspect of a comprehensive, modern data protection strategy. Laptops and mobile devices are the primary means through which employees read and modify corporate data. Despite the ongoing shift to software-as-a-service (SaaS), users commonly save

Tagged with: , , , , , , , , , ,
Posted in Blog

Modernizing the Security Perimeter for Hybrid and Multi Cloud – DH2i Briefing Note

Hybrid and multi cloud infrastructures represent today’s “new norm” for IT infrastructure. Heterogeneity is required for IT shops to simultaneously meet stringent cost and growing service level agreement (SLA) requirements on an application-specific basis. These architectures are powerful tools for

Tagged with: , , , , , , , , ,
Posted in Briefing Note

Is File Sync and Share OK for Endpoint Backup?

A surprising number of organizations and users consider their file sync and share (FSS) solution to be a suitable replacement for backup. With an FSS solution if a user accidentally deletes a file the FSS service can provide the user

Tagged with: , , , , , , , , , ,
Posted in Blog

Revamping Your Endpoint Protection Strategy to Minimize Downtime and Data Loss

Endpoint protection threatens to be the Achilles heel of modern IT shops. The need to protect endpoints has been around for decades – but doing so remains largely painful, especially as enterprise mobility usage proliferates. Protecting hundreds or thousands of

Tagged with: , , , , , , , ,
Posted in Blog

Protecting Your Data Protection’s Blind Side – Endpoints

Laptops, smartphones, and tablets are how users get work done. A surprising amount of organizational data is stored exclusively on laptops, never touching data center storage. Endpoints are also on the front lines of business where they are the most

Tagged with: , , , , , , , ,
Posted in Blog

How to Prevent Data Leaks in a Collaborative World – MyWorkDrive Version 5 Briefing Note

Collaboration and Data Leak Prevention (DLP) seem to be at odds with each other. Collaboration requires sharing data and it seems like copying that data to a sharing service is the only viable alternative. The only way IT can protect

Tagged with: , , , , , , , ,
Posted in Briefing Note

How To Simplify Branch Office Connectivity – Silver Peak Briefing Note

The modern data center enterprise is made up of mobile workers and many offices of different sizes. The problem is branch connectivity is left out of the modernization effort. The days of a single main headquarters data center location are

Tagged with: , , , , , , , , ,
Posted in Briefing Note

How to Deliver Files Anywhere and Security Everywhere

Users seem to be everywhere and they can carry their compute in multiple forms (laptop, tablet, smartphone) at all times. They also want to have their files, the subset corporate data they work on, with them at all times. Also,

Tagged with: , , , , , , , ,
Posted in Blog