data-storage-insights-blog.jpg

STORAGE INSIGHTS

So much file data, so little time...

Archiving as Hot as Wasabi?

PHOTO CREDIT: hbak / iStock / Getty Images

It doesn’t get hotter than this…

Major enterprises like Amazon, Microsoft, Google, etc. have all been pushing the “cloud.”

Read More

Who Guards Your Digital Assets?

PHOTO CREDIT: FLICKR USER BEN PAL

While most organizations will agree their digital assets are just as important – if not more – than their physical ones, few organizations guard digital assets like they guard their physical assets. Beyond mission critical applications, data protection is typically a once-per-night event that rarely completes with 100 percent success.

Read More

File Reporter Release - version 8.1

We're pleased to bring our customers the next evolution of our File Reporter solution with v8.1.

Read More

Dell EMC World 2017 Recap (with pictures)!

As the Dell EMC World 2017 show came to a close in Las Vegas, our team walked away with an amazing experience.

Read More

ATTEND DELL EMC WORLD 2017 AND VISIT US FOR A CHANCE TO WIN A COMPLETE VR EXPERIENCE!

Dell EMC World 2017 – Las Vegas is just around the corner! From May 8-11th you can find us at Dell EMC's biggest technology expo along with dozens of other presenters, experts, celebrities and more.

Read More

How Many Junk Files are Killing Your Primary Storage Space?

It’s difficult for an administrator to get control of network storage when space begins to dwindle. Users see storage space as an unlimited supply for all of their files including videos, music, and personal executables.

When primary storage space is exhausted, the administrator can go the expensive route and buy new space, or he can assess storage usage and make the right changes to clear junk files from the network.

Read More

How Much of Your Storage Contains Malware?

Hacking is big money for the right data. Hackers have moved on from simple email worms and now target businesses. Their goal is to collect enough data to sell it on the black market. One way they can collect massive amounts of data is to drop malware on network storage. The malware has the ability to spread like wildfire and the damage to the corporation is immense.

Read More

Are Your File Audit Trails Sufficient for HIPAA Compliance?

Several regulatory bodies require file audit trails. HIPAA regulations require healthcare organizations to have extensive security on network files and data including audit trails that specify who accessed and edited data.

If you run any type of organization that requires healthcare data from your customers, you need to have the right audit trails in place.

Read More

A Brief Overview of Stubs and Data Archiving

If you're new to file archiving, you probably aren't familiar with the term "stub." A stub is a file that points to a file, similar to the concept of a shortcut on a desktop. Instead of pointing to an active file, a stub points to an archived file that has been moved to a new location.

When you start archiving files in an enterprise environment -- which you should do to keep network storage capacity optimized -- you will work with stubs.

Read More

Is Your Network Protected from Insider Threats?

Insider threats are one of the leading causes for data leaks. These threats are why your private organization’s data could be exposed to competitors or outsiders who want to sell it on the dark web.  

Insider threats include disgruntled employees or even just an innocent employee who accidentally fell for a phishing scam and loaded malware on a workstation. 

Read More

Subscribe to Our Blog

SEARCH

  • FOLLOW US
  • facebook
  • twitter
  • linkedin
  • youtube
GOT A QUESTION?
Just Ask