• Too Close for Comfort: Insider Threats to Enterprise Data

    05.18.16 | By in Trends

    Given the barrage of external threats to enterprise data, it’s easy to blame faceless outsiders for every breach.  Beset...

  • A Beginner’s Guide to Self-Healing Storage

    05.16.16 | By in Tech

    When thinking of a traditional filing system, what comes to mind? Perhaps a categorical or hierarchical set of descriptors...

  • The Real Value of Customer Success

    05.12.16 | By in Trends

    While the concept of customer success has been around for some time, the term has gained increasing credence among...

  • Gartner Critical Capabilities Report: Comparing 8 Top Enterprise Endpoint Backup Vendors

    05.10.16 | By in Trends
    In the latest Critical Capabilities for Enterprise Endpoint Backup report, Gartner evaluated eight endpoint backup products against 11 critical…
  • Why Global Dedupe Is The ‘Killer Feature’ of Cloud Backup

    05.04.16 | By in Tech

    Thanks to recent advances in mobile technology, device storage capacity continues to closely follow Moore’s Law—that is, doubling approximately...

  • Using Box and inSync for Comprehensive Data Protection and Governance

    05.02.16 | By in Trends

    As the digital revolution goes mainstream, organizations are leveraging the cloud to maximize employee and overall business productivity, leading...

  • The Move to In-House eDiscovery and What IT Can Do to Lead the Way

    04.25.16 | By in Trends

    Increases in the mobile workforce, litigation and adoption of cloud technologies have created a perfect storm for IT and...

  • 6 Steps You Should Be Taking to Prevent Ransomware

    04.21.16 | By in Tech

    With ransomware attacks on the rise, many organizations today are feeling helpless and unsure of how to reduce their...