Mr. Robot, Reduxio, and Today's New Data Protection

Ken Smallwood - Monday, January 09, 2017

Fans of TV series Mr. Robot may have have seen the Season 2 premiere which centered on a ransomware attack initiated by hacker group fsociety. The target was Evil Corp, whose logo resembles that of the old “Enron” logo (which may have been the creator's intent), and the company found itself caught in a crippling hack.


Simplicity: A Breakthrough in Point-in-Time Data Recovery

Atul Chowdhry - Monday, December 19, 2016

Historically, IT departments protected data in one of two ways. First, through the use of backups, and secondly, usually implemented by larger organizations, through using highly available system components and applying best practices.


A league for it superheroes

Kerstin Jensen - Monday, December 12, 2016

IT pros don’t get to be in the limelight often. They usually just stay in the wings doing their job, be it troubleshooting some network issue, analyzing logs, managing storage systems, fixing a software bug, and more. You get the picture – the IT professional is hard at work in the background to keep things running smoothly. Well, that is, until he gets dragged out of his hideaway when IT catastrophes strike in the corporate world.


4 KEY ELEMENTS OF STORAGE PERFORMANCE OPTIMIZATION YOU CAN'T AFFORD TO MISS

Eyal Traitel - Monday, December 05, 2016

I get to talk to customers quite often and when the conversation turns towards storage performance, and we talk about 120K IOPS and sub-millisecond latency in OLTP workloads coming off a 2U array that holds more than a hundred terabytes, I typically get asked "how comes it's that fast?", or "what is the impact on performance of dedupe, compression, data protection?".


Podcast: Technology behind one of California's most innovative offices

Reduxio Systems - Monday, November 21, 2016

7 Challenges Every IT Superhero Can Relate With

Kerstin Jensen - Tuesday, November 08, 2016

Let’s face it; even though IT professionals are superheroes in their respective organizations, they can struggle too.

But then again, if things were that easy, it wouldn’t take an IT Superhero to handle the job, right? That said, we’ve listened to the feedback you have provided here and compiled a list of the top seven most common struggles that professionals in the IT world face. 


How to defeat the it villain - ransomware in 35 minutes!

Reduxio Systems - Tuesday, November 01, 2016

Among the many threats that are surfacing in the IT world, ransomware is one of the biggest and deadliest. Every day, about 4000 companies are under threat of attack – an increase of 300% compared to 2015’s figures. Moreover, more than $200 million has been paid to ransomware hackers in the first quarter of 2016 alone. In other words, the IT Superheroes are facing a rapidly-growing threat that doesn’t seem to be slowing down!


4 new superpowers you need to combat any IT villain!

Kerstin Jensen - Tuesday, October 25, 2016

The IT universe is ever-changing: Ecosystems become more complex and new issues arise every day. IT evils are hacking and hatching new ideas, plotting your demise as a defender of the IT infrastructure. But there’s no need to worry: We have made a complete list of the latest IT superpowers available to fight the villains roaming the cyberworld!


“Your Computer Has Been Locked” - Everything you need to know about Ransomware

Reduxio Systems - Monday, October 17, 2016

Are you concerned that your industry will become the target of ransomware? Have you heard about the different types of ransomware and how much operating loss your company could be subjected to? Are you aware of the different ways to prevent and recover from ransomware lockouts?


Ransomware: Be afraid. Be very afraid.

Eli Lopez - Friday, October 07, 2016

Cyber attacks happen. How can you recover quickly?

If you are in IT management, everywhere you turn, you see warnings of malicious forces working diligently with the one aim of compromising your security and eating your data for lunch.

It’s not a question of if anymore but rather of when. Many times the cyber security tools will not prevent the break-in, but only alert you of the compromise.