Riverbed Optimizes Data Protection with Cloud

IT performance company Riverbed Technology is optimizing data protection through its new Riverbed Whitewater cloud storage gateway models. Riverbed’s new releases will enable more businesses of all sizes to leverage the benefits of cloud data protection.

The company has designed these models according to the size of the company. Small and medium sized businesses may use the new Whitewater models 510 and 710. The Whitewater model 2010 is ideal for the mid-sized enterprise and targeted use cases in the large enterprise.

Following this announcement, Whitewater cloud storage gateways can now aid businesses cut down operational burdens, costs and complexity when using public cloud storage for data protection.

Riverbed offers hardware-based cloud storage gateway appliances and a virtual version of its cloud storage gateway for data protection.

As many organizations are grappling with the explosion in data growth in their IT environments, cloud storage has emerged as an attractive data protection option. SMBs can quickly and easily add offsite protection capabilities, but only pay for storage as needed and without investing in or managing a secondary data center,” said Bob Laliberte, senior analyst, Enterprise Strategy Group.

As enterprises increase their use of server virtualization and implement other strategic IT initiatives, the growth and the sheer volume of data present a greater challenge for data protection strategies. With these new Whitewater models, Riverbed provides a data protection solution that helps organizations accelerate recovery times, drive down the cost of backup and improve disaster recovery (DR).”

Whitewater cloud storage gateway solutions boast a range of abilities including protecting more data more often; seamless integration without disruption; reduction of IT management cost and time; reduction of backup costs by reducing storage requirements; and secure protection with dual-level encryption.

The solutions also provide the flexibility to work with other cloud storage providers and most popular backup applications.

By Anuradha Shukla

Sorry, comments are closed for this post.

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…