Tape Is Your Last Line of Defense Against Ransomware, But There Are Other Best Practices for Protecting Your Data

Encryption is a great way to keep data secure, but sometimes it can be used against us. Yes, we’re talking about ransomware. According to Statista, “preventing malware, including ransomware” is ranked as the second most pressing cyber security issue in 2017, according to IT security professionals worldwide, just after “identifying vulnerabilities.”

The Past 24 Hours of New Ransomware…

It’s a casual weekday at work and, armed with a steaming cup of coffee, you tuck, dip, and juke your way past coworkers to avoid spilling the contents of that 12 oz. mug. As you make your way back to your desk, a quick glance at your inbox reveals emails from a slightly familiar sounding domain. At this critical moment, you let down your guard and click on its simplistic message, giving hackers access to your system. An eruption of swearwords follows as you realize what has happened and accidentally knock over that coffee.

Think “Data Management,” Not Just “Data Protection”

Today, everyone seems to understand the ever-growing importance of data protection, often viewing it as a superset of backup combined with snapshots and replication. Typically, a conversation about data protection includes the assumption of a “gold standard” centered on using secondary disk for rapid recovery and tertiary tape for long term retention. Of course, “the cloud” also is always a consideration as part of the next generation of the solution. It’s still all under the banner of “data protection” (DP), the collection of activities, methods, and media used to help recover or restore business information after a crisis or other IT disruption. According to research, primary storage is growing around 40% annually, with secondary storage used for data protection growing at similar rates. Budgets aren’t growing nearly that much. Meanwhile, IT organizations are being asked to do more (i.e., inject more agility, functionality, and resiliency into their operations) while spending as little budget money as possible. In actuality, data protection budgets are growing around 4.6% annually according to ESG research, but that level of increase won’t even let you keep doing what you have been doing at a larger scale.Therefore, you have to do something different. What you should do: ARCHIVE!

Celebrating Quantum’s 35th Anniversary

Yesterday was an exciting day for Quantum. We had the honor of ringing the Closing Bell® on the New York Stock Exchange to commemorate the 35th anniversary of the company’s founding. It was a great feeling to represent the entire Quantum team as we marked this significant milestone and looked forward to building on our rich heritage. The company has changed significantly over the years, but here are 4 areas that have remained constant.

Is DXi6900 the Silver Bullet for Your Growing Backup Pains?

Quantum's DXi6900 proudly received the Silver Award in Storage Magazine/SearchStorage.com's 2014 "Product of the Year Backup Hardware" category. This industry recognition comes just as industry analyst ESG released the results of their recent lab testing, validating DXi6900’s performance claims. Both the award and lab validation are a big deal for us and reinforce what we’ve already been hearing from our happy customers: DXi6900 is a high performance appliance that is very well suited to the needs of mid-size and enterprise-scale companies as well as managed service providers.

Tips On How To Prepare for a Data Breach

The cybersecurity headlines have gotten bigger, bolder, and more prevalent as 2014 draws to a close. Not surprisingly, as a result of these costly cyber incidents, there has been much discussion about how to prevent—how to detect—and how to prepare for cyber attacks, including my recent article in InformationWeek’s Wall Street & Technology: "5 Tips On How To Prepare For A Data Breach."

DXi’s Dedupe Solutions for the Real World Impress Analysts

Since launching the DXi6900 in July, we’ve seen remarkable customer interest. That interest is one of the key drivers of the 11% year-over-year growth in DXi revenue we reported last quarter. Now another data point showing how the DXi6900 and the entire DXi family stacks up against other deduplicating backup appliances has just been published: Industry analyst DCIG issued their annual buyer’s guide and the DXi6900 earned a “recommended” rating, with just .45 points separating it from the top spot. In fact, DXi appliances took three of the top 6 spots in the list. So why is the DXi6900 getting so much attention? And how do DXi's deduplication solutions work for "real world" customers?

Where to Deduplicate, and How to Keep it Simple

Deduplication is now widely recognized as a proven technology in the datacenter. In fact, it seems to be cropping up everywhere – from flash arrays to backup applications, and of course disk backup appliances. There’s no end in sight for structured and unstructured data growth, and with the proliferation of technology like deduplication, it is not unusual that the level of complexity increases, as does the challenge to keep it in check. A good first step is to recognize where deduplication can best be applied. Here are a few of the considerations.

Research and the Reality of Data Protection

Data protection strategies have been in a state of accelerated evolution over the last five years. I hear this confirmed regularly by customers describing their implementation stories with Quantum, as well as by the industry analysts that we meet with to discuss our latest product innovations. ESG’s Jason Buffington is one of those analysts that we talk with often, and it’s always interesting to see how ESG’s research squares against what we’re seeing in data centers. Jason’s latest video blog about modernizing data protection – 8 Suggestions for Every Data Protection Strategy – highlights ESG research that resonated with me in a number of respects.

reTHINK Backup and Archive

As the volume of data has increased, there has been a shift in the way that companies use and access that data. That means it’s time to change the way you think about data protection, retention, and accessibility. Organizations of all sizes recognize that data can help gain competitive advantages and even support new revenue streams, but this is placing a demand on IT to store and preserve access to that data. Companies need new solutions and technologies to support unpredictable, on-demand access and incorporate new approaches to backup and archiving. It’s time to reTHINK Backup & Archive.

Load More