Search
Close this search box.

Category: Data Protection

Enterprise Data Protection Maturity

Free – and Nice! – Enterprise Data Protection Maturity Assessment

Too many enterprises deploy data protection technologies and processes thinking they can now withstand a cyberattack attack. Only after a ransomware attack occurs do they find these technologies and processes fail them at the most critical moment. To avoid this, enterprises must objectively assess the effectiveness of their existing data protection infrastructure. To help, Cobalt Iron and DCIG have partnered to create a free survey that nicely assesses their data protection maturity.

Read More
Cloud Backup

3 Factors that Drive AWS Cloud Backup Decisions

Every organization that hosts production workloads or data in the Amazon Web Services (AWS) cloud should take steps to protect them. This explains why organizations continue to perform backups in AWS. However, their ability to do AWS cloud backups well long term may hinge on three factors.

Read More

The 4 Goals Cyber Resilient Offerings Should Ideally Meet

Ransomware has put an increased emphasis on organizations putting together a viable cyber resiliency strategy. This entails organizations appropriately identifying and classifying which software they use falls under the cyber resiliency umbrella. However, they must do more than simply identify software as cyber resilient. They must also validate it satisfies established goals that make it cyber resilient.

Read More

Backup Solutions Still Have a Home in Today’s HA World

Driven by their intolerance for downtime, organizations seek out highly available technologies and infrastructures to host their applications and data. Unfortunately, even given access to almost unlimited resources organizations get no guarantees of perpetual uptime. To address this shortcoming, organizations must continue to give backup solutions a home in their highly available (HA) world.

Read More
Large Enterprise VMware vSphere Backup Solution

Distinguishing Features of Large, Midsize, and Small Enterprise VMware vSphere Backup Solutions

Recent DCIG research revealed the characteristics that distinguish large, midsize and small VMware vSphere backup solutions from one another. VMware offers APIs that backup software may use to integrate with vCenter to centralize and administer data protection. These integrations with and leveraging of the VMware APIs influence which types of enterprise environments these backup solutions best fit.

Read More

Taking a Singular Approach to Protecting from Ransomware Attacks

Bringing together backup and cybersecurity software and delivering them as a single solution used to strike me an improbable combination. After all, what was the business driver to bring them together? Then ransomware changed everything. Suddenly, the idea that an organization had good but compromised backups did not seem so far-fetched. This created the need for singular data and threat protection solutions that Acronis Cyber Protect helps exemplify.

Read More

Innovations in Instant Recovery

Application outages may occur for any number of reasons. Whether hardware failures, software bugs, user error, or a ransomware attack, these events cause application downtime. Since application downtime has multiple deleterious effects on organizations, fast application recoveries have taken on new importance. In response, virtual machine (VM) backup software providers have introduced and implemented multiple new instant recovery features into their solutions.

Read More

Click Here to Signup for the DCIG Newsletter!

Categories

DCIG Newsletter Signup

Thank you for your interest in DCIG research and analysis.

Please sign up for the free DCIG Newsletter to have new analysis delivered to your inbox each week.