Contact Us

Introducing the QV1020: The New Addition to the High-Performance, Cost-Effective, QV-Series

Across industries, the adoption of flash arrays is growing faster than ever before. In fact, from 2018 to 2023, the flash array market is projected to grow 25 percent per year. It’s very likely that not even the economic slowdown caused by the COVID-19 pandemic will have much of an impact on this projected growth, as organizations search…Read More

Unbreakable Backup Mitigates Cyber Security Threats

The current COVID-19 crisis spurred an increase in cyberattacks taking advantage of the sudden shift to virtual work and uncertainty surrounding health and safety information. Between March and May of this year, reported ransomware attacks increased 148% with global manufacturing, government, and internet providers the hardest hit1. Ransomware attacks are the new “go-to” for criminal…Read More

Best Practices for Setting RAID Levels on the Nexsan E-Series and BEAST Series

The Nexsan E-Series and BEAST enterprise class storage systems are capable of being configured with multiple simultaneous RAID levels. The traditional RAID levels of 0, 1, 1+0, 4, 5 and 6 are supported, as well as the Nexsan unique levels Accelerated RAID 5S and 6S where parity is stored on dedicated SSD(s) to improve random…Read More

Storage Optimization – Key Steps to Maximize File Protection and Storage ROI

Cost-Efficient Storage Optimization Storage optimization may be defined as the process of moving data to the most efficient and cost-effective storage system for that data.  Here are a few quick steps to cost effectively identify, manage, and protect your most important data. Step 1: Identify You can’t protect what you can’t see or identify, yet…Read More

How to Protect Your Organization From Ransomware

Understanding what data is at risk during a ransomware attack is the first and most critical step to take, in order to prevent a large-scale disaster. Ransomware extortionists attack the computer network with malware that encrypts every file, and then demands a large ransom payment to a “darknet” site before the decryption key is provided.…Read More