was successfully added to your cart.

Cart

Seven Basic Questions to Screen Cloud Storage Offerings

By | Cloud, Cloud Storage | No Comments

Using cloud storage often represents the first way that most companies adopt the cloud. They leverage cloud storage to archive their data, as a backup target, share files, or for long term data retention. These approaches offer a low risk means for companies to get started in the cloud. However, with more cloud storage offerings available than ever, companies need to ask and answer more pointed questions to screen them.

Read More

The Journey to the Cloud Begins by Speaking the Same Cloud Language

By | Cloud | No Comments

Every company wants to make the right cloud decision for their business. As a result, more companies than ever ask their vendors to describe the cloud capabilities of their products. However, as you ask your vendors cloud questions, verify that you define the cloud the same way. You may find that how you and your vendors define the cloud differ significantly which can quickly result in communication breakdowns.

Read More

Four Ways to Achieve Quick Wins in the Cloud

By | Cloud, Cloud Computing, Cloud Storage, Data Protection, Deduplication, Disaster Recovery | No Comments

More companies than ever want to use the cloud as part of their overall IT strategy. To do so, they often look to achieve some quick wins in the cloud to demonstrate its value. Achieving these quick wins also serves to give them some practical hands on experience in the cloud. Incorporating the cloud into your backup and disaster recovery (DR) processes may serve as the best way to get these wins.

Read More

Five Reasons Why Organizations Choose DCIG to Create Competitive Intelligence Reports

By | Competitive Intelligence, Competitive Intelligence Report | No Comments

At a high level, anyone can prepare a competitive intelligence report. All one needs is an Excel spreadsheet, a web browser, access to the Internet, a list of your competitors, and a list of product features. Then, boom, just like that, you have a report. However, companies that engage DCIG to create Competitive Intelligence Reports want much more that an Excel spreadsheet with a list of features and check marks in order to truly empower their sales staff and partners.

Read More

Lenovo TruScale and Nutanix Enterprise Cloud Accelerate Enterprise Transformation

By | Cloud, Data Center Management, DCIG, Hyper-converged, Private Cloud | No Comments

Digital transformation is an enterprise imperative. Enabling that transformation is the focus of Lenovo’s TruScale data center infrastructure services. The combination of TruScale infrastructure services and Nutanix application services creates a powerful accelerant for enterprise transformation.

Read More

HYCU Continues Its March Towards Becoming the Default Nutanix Backup Solution

By | Cloud, Data Protection, Hyper-converged | No Comments

Any time a new operating system platform comes to market, one backup solution tends to lead in providing a robust set of data protection features that companies can quickly, easily, and economically deploy. It happened with Unix. It happened with Windows and VMware. Now it is happening again with the Nutanix Acropolis operating system (AOS) as HYCU continues to make significant product enhancements in its march to become the default backup solution for Nutanix-centric environments.

Read More

Breaking Down Scalable Data Protection Appliances

By | Backup Appliance, Data Protection, Data Reduction, Deduplication, Hyper-converged | No Comments

Scalable data protection appliances have arguably emerged as one of the hottest backup trends in quite some time, possibly since the introduction of deduplication into the backup process. These appliances offer backup software, cloud connectivity, replication, and scalable storage in a single, logical converged or hyperconverged infrastructure platform offering that simplify backup while positioning a company to seamlessly implement the appliance as part of its disaster recovery strategy or even create a DR solution for the first time.

Read More

Convincing a Skeptical Buyer that Your Product is the Best

By | DCIG | No Comments

Every company tends to believe that its products are the best in whatever market it services. Nothing wrong with that mindset – it helps your company sell its products and succeed. However, convincing a skeptical buyer of the superiority of your company’s product changes the dynamics of the conversation. He or she expects you to provide some facts to back up your claims to persuade him or her to buy from you.

Read More

DCIG’s ISC West 2019 Best of Show in Video Surveillance

By | Artificial Intelligence, DCIG, Hyper-converged, Information Management | No Comments

ISC West—the International Security Conference and Exposition—provides insight into some of the biggest trends in the security industry. The conference attracted more than 30,000 attendees and nearly 1,000 vendors earlier this month. DCIG analysts planned our attendance at this year’s conference with a focus on video surveillance, especially video analytics. We had an eye-opening experience.

Read More

DCIG 2019-20 Enterprise Deduplication Backup Target Appliance Buyer’s Guide Now Available

By | DCIG | No Comments

The DCIG 2019-20 Enterprise Deduplication Backup Target Appliance Buyer’s Guide helps enterprises assess the enter­prise deduplication backup target appliance marketplace to help them identify which appliance may be the best fit for their environment. This Buyer’s Guide includes data sheets for 19 enterprise deduplication backup target appliances that achieved rankings of Recommended and Excellent. These products are available from five vendors including Cohesity, Dell EMC, ExaGrid, HPE, and NEC.

Read More

TrueNAS Plugins Converge Services for Simple Hybrid Cloud Enablement

By | DCIG Sponsored Analysis, Hybrid, Storage Systems | No Comments

iXsystems is taking simplified service delivery to a new level by enabling a curated set of third-party services to run directly on its TrueNAS arrays. TrueNAS already provided multi-protocol unified storage to include file, block and S3-compatible object storage. Now pre-configured plugins converge additional services onto TrueNAS for simple hybrid cloud enablement.

Read More

NVMe-oF Delivering While Persistent Memory Remains Mostly a Promise

By | DCIG, NVMe-oF, Storage Class Memory | No Comments

The SNIA Persistent Memory Summit held in late January 2019 provided a good view into the current state of industry. Some key technologies and standards related to persistent memory are moving forward more slowly than expected. Others are finally transitioning from promise to products. This article summarizes a few key takeaways from the event as they relate to enterprise storage systems.

Read More

Analytics, Microservices and Scalable Storage Finding Their Way onto Backup Appliances

By | Backup Appliance | No Comments

Companies of all sizes pay more attention to their backup and recovery infrastructure than perhaps ever before. While they still rightfully prioritize their production infrastructure over their backup one, companies seem to recognize and understand that can use backups as more than just insurance policies to recover their production data. This is resulting in cutting edge innovations such as analytics, microservices, and scalable storage finding their way into backup solutions in general and backup appliances specifically.

Read More

Make the Right Choice between Scale-out and Scale-up Backup Appliance Architectures

By | Backup Appliance, Data Protection, Deduplication | No Comments

Companies are always on the lookout for simpler, most cost-effective methods to manage their infrastructure. This explains, in part, the emergence of scale-out architectures over the last few years as a preferred means for implementing backup appliances. It is as scale-out architectures gain momentum that it behooves companies taking a closer look at the benefits and drawbacks of both scale-out and scale-up architectures to make the best choice for their environment.

Read More

The New Need to Create a Secondary Perimeter to Detect for Malware’s Presence

By | Security, Threat Assessment | No Comments

Malware – and specifically ransomware – tends to regularly make headlines with some business somewhere in the world reporting having its data encrypted by it. Due to this routine occurrence, companies need to acknowledge that their standard first line defenses such as cybersecurity and backup software no longer completely suffice to detect malware. To augment these defenses, companies need to take new steps to shore up these traditional defenses which, for many, will start with creating a secondary perimeter around their backup stores to detect the presence of malware.

Read More
Bitnami