We recently published a solution page that focuses on a new way to protect large scale-out NAS clusters. As with all solutions we develop, this one started with a customer – two customers actually. In both cases, these customers were storing Petabytes of data on large Isilon systems. Their protection approaches were different. In one case, the customer … [Read more...] about Considerations for Protecting Large Scale-Out NAS Clusters – Veeam Software
Amidata Industry News Archive
An archive of industry news articles for solutions and services supported by Amidata.
Data security – Veeam Software
There are many risks to data: from the IT admins worst nightmare, ransomware, to a company's worst nightmare, a malicious admin. Data security is a huge challenge and becomes increasingly more important to understand as data grows rapidly, sprawls to different platforms and becomes more valuable. This topic is a straightforward concept, protect the data, but the many ways to go … [Read more...] about Data security – Veeam Software
How Service Providers protect your data against common cybersecurity threats, Veeam Software
Security challenges for IT professionals and organizations today are multitudinous. Every day we learn of an organization that became a victim to a cybersecurity breach or other malicious event. An event such as ransomware, essentially puts a business and their customers’ sensitive data at risk. Your infrastructure, networks and data should be protected, and most organizations … [Read more...] about How Service Providers protect your data against common cybersecurity threats, Veeam Software
Blocks, Files, Objects: What is right for your application? – Quantum
Remember when life was simple, and you only had to pick either NAS or SAN? Now, a storage admin has many storage-format options to choose from, such as block, object, file, and NAS, and if you head over to our friends at AWS, they add a few more acronym options. Making the right choice when selecting what format will best serve your data and workflow needs can be confusing, but … [Read more...] about Blocks, Files, Objects: What is right for your application? – Quantum
Re-Imagining Quantum’s Portfolio for Managing Unstructured Data – Quantum
his week, we made a significant announcement, introducing an expanded portfolio focused on classifying, managing, and protecting unstructured data across its lifecycle. The new products we introduced represent another significant step in our vision to lead in video and unstructured data solutions and represent a key shift in focus from ‘storing’ data to ‘managing’ … [Read more...] about Re-Imagining Quantum’s Portfolio for Managing Unstructured Data – Quantum
What Matters in Storage – Quantum
The past few decades have brought a series of innovations to the storage industry, such as tiering, snapshots, deduplication, replication, iSCSI, SSD, NVMe, and a few others, but the storage service itself hasn’t changed. This might sound shocking; let me explain by first, establishing a definition of a storage service. Storage service is the combined delivery of … [Read more...] about What Matters in Storage – Quantum
3 Tips to Protect Essential Data in a Multi-cloud Environment – Forcepoint
Cloud usage was on the rise even before recent events made the rapid shift to remote work imperative for many organizations. More than 85% of organizations were using at least some public cloud services, and nearly 40% described themselves as “cloud-first” in their strategic approach to computing resource selection. Today’s numbers are likely even higher, with all major … [Read more...] about 3 Tips to Protect Essential Data in a Multi-cloud Environment – Forcepoint
5 Habits of Highly Data-Secure Companies – Forcepoint
With digital assets scattered across IT environments and data breaches still an everyday concern, organizations are faced with a daunting security challenge: how do you harmonize the security model to avoid having different best practices and tools for the traditional three-tier data center than you have for the cloud? A recent study conducted by IDG in May … [Read more...] about 5 Habits of Highly Data-Secure Companies – Forcepoint
Getting Practical Advice for Implementing SASE and Zero Trust – Forcepoint
This time last year, two trends in cybersecurity were beginning to get real traction: Gartner’s Secure Access Service Edge (SASE) and Forrester’s Zero Trust (ZT). But that was just the beginning. Little did we know that the world would turn upside in March, driving most of us to flee our offices and work remotely from home. IT organizations performed heroic acts to get people … [Read more...] about Getting Practical Advice for Implementing SASE and Zero Trust – Forcepoint
Data Protection: How do you combat such a complex and varying challenge?
Businesses are being reimagined by the day. We live in an era that is quickly becoming defined by digital transformation and disruption. It’s unlike anything society has experienced previously. New technologies develop by the day, and these technologies are enabling organisations to reimagine how they deliver services, how they create experiences, and even how they retain … [Read more...] about Data Protection: How do you combat such a complex and varying challenge?