Resilience is a hot topic these days, and for good reason. With our hyper-dependency on data and access, there is a very low tolerance for error or disruption, and the distributed nature of our workforce makes “edgeless” networks an attractive and lucrative target for adversaries. Cyber Resilience includes elements like endpoint protection, firewalling, advanced phishing, email protection and DNS defense – all working together to ensure a fortified security posture. Yet… Read More
VDI Could be Exactly What your Organization Needs Right Now
Original blog posted by DataEndure Infrastructure Practice Manager, Bryan Chun on linkedin.com The changes to accommodate remote work have put many IT organizations at a disadvantage. Companies were caught off guard, having put off low priority remote access projects for a later time that are now critical to business operations. The global pandemic forced shelter-in-place for many and will continue to affect where and how people work for the foreseeable… Read More
How to Avoid the 36-Month ‘Tech Refresh’
Purchasing a new enterprise storage system is usually the largest data center equipment purchase for most companies. The cost is justified because these systems store and protect the companies most critical data and applications. In fact, the purchase often includes multiple systems so it can provide quick recovery at another location in case of a natural disaster or power outage. So how do these storage vendors reward their customers for… Read More
Who does CASB and Why Do We Need It?
A cloud access security broker, usually referred to as a CASB, offers a security gateway between your company’s IT infrastructure and that of a cloud provider. Companies use a CASB to extend their own IT governance policies and government regulations to third-party software and storage. If you have concerns about internal or external security threats, monitoring usage and behavior, or auditing historical data, you may need a CASB. To understand… Read More
How to Consolidate and Store Your Aging Tape Inventory
Can you name the oldest kind of storage medium that’s still commonly in use today? According to Storage Newsletter, it’s magnetic tape, a vintage technology that was invented in the 1920s to record sound. One of the reasons that so many companies still store data on tape is simply because it’s cheap and reliable. Kept under the right conditions, magnetic tapes can last for decades. Some companies still have thousands of… Read More
How to Approach Storage Optimization for Space- and Cost-Efficiency
In our experience, many companies have relied upon a one-size-fits-all approach to data storage. Sooner or later, that approach grows inefficient, expensive, and in some cases, unworkable. This is particularly true if a company has not reanalyzed their storage needs for some time. Many of our new clients have concerns about performance, security, and costs. When we analyze and categorize our client’s data, questions about efficient, secure, and affordable data… Read More
How and Why You Should Determine Your RTO and RPO
Conversations between a DataEndure SME backup engineer and customer can go like this: I need to revamp my company’s backup-and-restore solution. The script I’ve been tweaking all along is getting too complicated and error-prone. But while I’m ripping and replacing, where can I get some of that virtual recovery stuff I’ve been hearing about? We’d be happy to show you, but first let’s map out your current situation. Which of your applications… Read More
HID/HIPS & Information Management: Hardening the Backup Infrastructure
Let’s take a moment to examine the potential of Symantec’s Data Center Security Agents on Veritas NetBackup Appliances They once lived happily ever after… Many of you should be familiar with the big names in information management and security. Veritas and Symantec. Once separate entities, they courted each other, merged under the same umbrella, and then due to wanting different things in life, the two companies split apart. During… Read More