Category: Data Protection

The 4 Goals Cyber Resilient Offerings Should Ideally Meet

Ransomware has put an increased emphasis on organizations putting together a viable cyber resiliency strategy. This entails organizations appropriately identifying and classifying which software they use falls under the cyber resiliency umbrella. However, they must do more than simply identify software as cyber resilient. They must also validate it satisfies established goals that make it cyber resilient.

Read More

Backup Solutions Still Have a Home in Today’s HA World

Driven by their intolerance for downtime, organizations seek out highly available technologies and infrastructures to host their applications and data. Unfortunately, even given access to almost unlimited resources organizations get no guarantees of perpetual uptime. To address this shortcoming, organizations must continue to give backup solutions a home in their highly available (HA) world.

Read More

Distinguishing Features of Large, Midsize, and Small Enterprise VMware vSphere Backup Solutions

Recent DCIG research revealed the characteristics that distinguish large, midsize and small VMware vSphere backup solutions from one another. VMware offers APIs that backup software may use to integrate with vCenter to centralize and administer data protection. These integrations with and leveraging of the VMware APIs influence which types of enterprise environments these backup solutions best fit.

Read More

Taking a Singular Approach to Protecting from Ransomware Attacks

Bringing together backup and cybersecurity software and delivering them as a single solution used to strike me an improbable combination. After all, what was the business driver to bring them together? Then ransomware changed everything. Suddenly, the idea that an organization had good but compromised backups did not seem so far-fetched. This created the need for singular data and threat protection solutions that Acronis Cyber Protect helps exemplify.

Read More

Innovations in Instant Recovery

Application outages may occur for any number of reasons. Whether hardware failures, software bugs, user error, or a ransomware attack, these events cause application downtime. Since application downtime has multiple deleterious effects on organizations, fast application recoveries have taken on new importance. In response, virtual machine (VM) backup software providers have introduced and implemented multiple new instant recovery features into their solutions.

Read More

It is Time to Demand More from Infrastructure Providers

Ransomware attacks are escalating in terms of frequency, variety, and impact. Based on reliable information sources, it is reasonable for every organization to expect it will experience multiple attempted ransomware attacks in the next twelve months. Given this threat environment, it is time to demand more from infrastructure providers.

Read More

Click Here to Signup for the DCIG Newsletter!

Categories

DCIG Newsletter Signup

Thank you for your interest in DCIG research and analysis.

Please sign up for the free DCIG Newsletter to have new analysis delivered to your inbox each week.