- November 16, 2017
Endpoint backup specialist Druva's Apollo service for its cloud platform provides a management plane for IaaS and PaaS workloads. Features include snapshot management.
- November 08, 2017
When using the public cloud, your storage strategy should take into account getting data in and out, and involving all of your IT and business teams before taking the plunge.
- October 31, 2017
Following its acquisition by Vista Equity Partners, the Datto backup and recovery line is merging with Autotask. The companies plan to integrate their products and expand.
- October 25, 2017
Aparavi uses a three-part architecture to try to elbow its way into the emerging and competitive market for protecting, restoring and managing data stored in multiple clouds.
- October 19, 2017
Commvault's HyperScale appliance is a scale-out architecture for linear scalability. HyperScale is part of the vendor's new product strategy to build out its data services.
Sponsored by NTT - Though the jury is still out over what constitutes successful digital transformation, there is no question about the immense excitement in this area as organizations seek to re-architect their IT environments to be more agile and responsive to modern business needs. See More
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by VMware - Data centers are going through a true revolution in design, scalability and economics in order to respond to evolving business demands, which have forced IT organizations to move at warp speed to evaluate, select and implement new technologies. The pressure is on to select the right IT platform to transform the data center from expensive, stodgy and rigid to agile, cost efficient and lithe. See More
Sponsored by Iron Mountain - As organizations continue to create greater volumes and more varieties of data, IT teams are facing mounting pressure to ensure they can respond comprehensively, cost-effectively and quickly to any e-discovery inquiry. See More
- October 18, 2017
Hitachi Vantara's Data Instance Director 6 was built with MongoDB to scale 100 times more than the previous version. HDID 6 also improves access control for security.
- October 10, 2017
Carbonite endpoint backup grows with the acquisition of Datacastle technology and customers. As a smaller company, Datacastle had been at a critical juncture.
- September 27, 2017
CEO of Veritas Technologies says despite all the changes swirling in the data protection world, the importance of data means 'incumbents get to win if they are good enough.'
- September 27, 2017
Once focusing on SQL Server, DH2i ventures into Linux waters. 'Smart Availability' allows users to move workloads any time, regardless of operating system.
- September 20, 2017
With the release of Veritas Access Appliance and the object-based Cloud Storage, the storage software vendor follows a path it started down with NetBackup Appliances for backup.
- September 19, 2017
Veritas 360 platform upgrades -- including cloud deduplication for NetBackup -- dominate the opening day of the vendor's Veritas Vision 2017 user conference.
- September 14, 2017
Doubling the capacity from the previous generation, LTO-8 will present a strong option for data archiving. Tape systems can be an effective piece of tiered storage, officials say.
- September 13, 2017
Iron Mountain unveiled its new Iron Cloud storage services that will be the foundation for its full-scale data management platform. The company is also opening a new data center.
- September 12, 2017
While doing preparation work for GDPR, organizations should look at the Equifax breach and understand they would have to notify customers of a problem much sooner.
- August 24, 2017
Acronis True Image software will use machine pattern learning to stay ahead of potential ransomware attacks by detecting suspicious behavior before files get corrupted.