Blog Archives

Time To Control Unstructured Data – NTP Software File Reporter Briefing Note

IT professionals are tired of hearing that the growth of unstructured data is out of control. While attempting to curtail its growth is a noble cause, what IT really needs is the ability to control and manage it. Gaining control

Tagged with: , , , , , ,
Posted in Briefing Note

Can the Cloud Solve the Archive Problem?

The cloud seems like an ideal place to archive data. It provides a pay-as-you-grow model and enables the organization to begin to shrink the size of its on-premises storage footprint. The problem is, though, the three big providers (Amazon AWS,

Tagged with: , , , , , , , , , ,
Posted in Blog

Can Ransomware Infect Your Backups? – BackupAssist Briefing Note

It should come as no great surprise that ransomware is one of the scariest challenges for data protection people today. Black hats have figured out they can make more money faster by going after small and medium businesses than simply

Tagged with: , , , , , , , , ,
Posted in Briefing Note

How Are Backup Software Products Responding to Ransomware?

Backup software products are starting to adopt anti-ransomware features – and that’s a good thing. Ransomware has clearly expanded beyond consumers and is regularly attacking businesses and government entities. But not every backup company is convinced this is a problem

Tagged with: , , , , , , , , , , , , , , , , , ,
Posted in Blog

Why Windows File Server Archive ROIs are Broken

Windows file server archiving is the process of getting all the old data off of an organization’s Windows file servers and moving them to some less expensive form of storage. The concept has been around almost since there were Windows

Tagged with: , , , , , , , , ,
Posted in Blog

Ransomware Protection Requires Different Protocols

The core server component of most modern backup applications run on Windows. Unfortunately, Windows is also the primary target of ransomware attacks. While there are incidents of attacks on Linux or Macs, ransomware creators are going to go for the

Tagged with: , , , , , , , ,
Posted in Blog