Not logged in » Login

Blog

September 08, 2021
In the previous two posts in this series of IDC blogs on data protection, we outlined how modern enterprise IT trends such as hybrid cloud adoption, data fragmentation, and ransomware challenge organizations to become resilient and trusted. We also described the limitations in traditional data protection strategies in meeting the new requirements.  In this blog, we will highlight how a modern data protection strategy can overcome the challenges but also help deliver digital business outcomes.
 
0 comments | 333 views
August 10, 2021
In the first in this series of blogs, IDC highlighted how modern enterprise IT trends such as hybrid cloud adoption, data fragmentation, and ransomware bring new data protection requirements. In this second blog, IDC will analyze the limitations in traditional data protection strategies in meeting the new requirements.
 
0 comments | 327 views
July 23, 2021
Organizations are faced with rampant data growth and cost, complex infrastructures, compliance regulations, and the increasing risk of data loss from ransomware attacks. Data is at the core of intelligent organizations, and their successful digital transformation (DX) relies on their ability to develop a unified data management and protection architecture for modern multicloud infrastructures. This series of three blogs written by IDC outlines how enterprises can boost data resilience and compliance in hybrid cloud by leveraging modern data platforms, data protection, and archiving capabilities. This first blog describes some challenges and requirements for modern data protection architectures. The second and third blogs will explore the limitations of traditional data protection strategies and the business value of modern data approaches. Our sincere thanks to Archana Venkatraman, associate research director of IDC's European cloud data management research, for this blog.
 
0 comments | 205 views
May 27, 2021
The rapid adoption of online meeting and team collaboration platforms was astronomical in 2020. With the proliferation of these tools and the growth of remote workforces, archiving has evolved its focus far beyond email. The rapid increase in regulations for data privacy, banking, healthcare, and government demands a more integrated and smarter approach to compliance, supervision and eDiscovery. In the most recent blogs about archiving, we highlighted the growing role of archiving platforms as a source of corporate memory, including the risks and rewards of recording digital conversations and the governance decisions needed to protect them.
 
0 comments | 318 views
March 26, 2021
In today’s business world the value of archiving is greater than ever, and enterprises recognize the need to make the most out of the growing volumes of data they hold. However, in order to fully exploit that data, organizations need to have a number of IT technologies, operational processes and business policies in place. Read below to find out more on modern archiving, and where it might make sense for you to use it as an integral component of enterprise data and information management.
 
0 comments | 436 views
March 04, 2021
Businesses are currently facing strict compliance regulations, rising security risks, and an explosive growth of new data. Learn how intelligent data archiving – as an integral part of a modern data-driven enterprise – can help your company to meet these critical challenges. Divided into 3 blog articles, don’t miss the first part to better understand the essentials about data archiving.
 
0 comments | 560 views
November 24, 2020
With a rising flood of data and the increasing complexity of data management and protection in the digital world (both on-premise and/or in the Cloud), organizations are making the analysis and optimization of their data-driven IT landscape a priority. Until now, it has been difficult to get a complete picture of the storage and backup capacity of an IT organization, since the dedicated tools of storage and backup system providers offer only a vendor-specific view of the systems. The new FUJITSU SystemInspection Service for Storage is designed to address that challenge. It provides a comprehensive overview of your hybrid IT landscape to help optimize your storage and backup infrastructure. The assessment provides end-to-end reports on the storage capacity from the hosts to the storage system and shows backup inconsistencies and the current physical storage capacity of the virtualized environments, giving you a valid basis for making decisions.
 
0 comments | 958 views
July 29, 2020
Fujitsu and their technology partners offer customers future-proof solutions for the data-driven enterprise to meet the challenges posed by unbridled data growth. This eco-system delivers the best technologies and solutions for ensuring optimal data management and protection – from server, storage, integrated systems, and software to services. While the solution was launched as a backup & restore solution radically optimized for VMware environments, the following article concentrates on how Veeam has developed their software to support Integrated System PRIMEFLEX – the converged, hyper-converged, and hybrid cloud infrastructure solutions from Fujitsu.
 
0 comments | 1523 views
June 24, 2020
Storage scaling: Scale-up and scale-out options available with Fujitsu ETERNUS
 
0 comments | 1379 views
June 23, 2020
Fujitsu offers you a broad data protection portfolio to protect your business against outages and cyberattacks. Our backup and archive solutions – among them data protection appliances, tape systems and backup software – perfectly integrate with our PRIMEFLEX solutions to simplify and consolidate your hybrid IT infrastructure. By building strong relationships and pursuing joint developments with market leaders in backup and archive software, we are able to offer you the most competitive solutions available. Read below to understand how the industry-leading Commvault Software perfectly fits into FUJITSU Integrated System PRIMEFLEX solutions.
 
0 comments | 934 views
May 21, 2020
FUJITSU Integrated System PRIMEFLEX is your fast track to modern data center infrastructures, whether converged, hyper-converged or hybrid-cloud. Find out how Veritas NetBackup™ Software can help to protect your business-critical assets in PRIMEFLEX environments.
 
0 comments | 831 views
April 28, 2020
Typically consisting of clustered building blocks with integrated network, storage and computing functions, hyper-converged infrastructures are the rising star in modern data centers. The hypervisor support for HCI often comes with data protection functionalities built in, however, the focus with that is on data replication rather than traditional backup and recovery, resulting in inadequate lifecycle management. These can carry risks of potential data loss by data corruption, deletion or if a disaster occurs. Below is the first blog of our series, which we hope will help you to protect your company’s crucial data.
 
0 comments | 572 views
March 17, 2020
Data is growing so much that it won’t be enough for today’s companies to simply scale storage systems to try to accommodate this ever-expanding quantity of data. They are facing additional challenges that have implications for storing and managing data. Low latency, uninterrupted access to vast data lakes and data tracking are perfect examples of those challenges. Stay tuned on why Fujitsu can be your business perfect partner when embracing the change.
 
0 comments | 618 views
October 22, 2019
Fujitsu don‘t stop at just providing computing and storage capacity with Nutanix Enterprise Cloud on PRIMERGY. A data copy within the same cloud or virtualized environments does not protect your data against disaster, system failure, data corruption or deletion. Therefore, it is essential to store business-critical data on a separate backup solution. Fujitsu’s data protection portfolio is ideally suited to protect data of virtual environments (traditional, converged or hyper-converged) on-premise, on private, hybrid or public cloud and is ‘Nutanix Ready’.
 
0 comments | 856 views
August 09, 2019
The essential move to SAP’s latest enterprise resource planning (ERP) suite, S/4HANA, can be a hassle for your company. When dealing with this kind of transformation, and in a world where high availability is crucial, every possible measure and precaution should be taken in order to avoid constraints on your business. That was exactly what Raysut Cement Company in Oman did, together with Fujitsu. And it was a success.
 
0 comments | 1215 views
July 10, 2019
With most businesses’ activity going fully-virtualized, the need to protect those environments has put additional focus on the backup and fast recovery of the virtual machines. The combination of Fujitsu ETERNUS, the industry’s widest choice of storage infrastructure, and Veeam Backup and Replication™, a leading Data Management solution, will help hundreds of thousands of companies to keep their businesses running.
 
0 comments | 1822 views
May 14, 2019
Commvault HyperScale™ Appliance lets you protect a wide range of applications as well as virtual and hyper-converged infrastructures with a single integrated solution. Based on PRIMERGY hardware and manufactured by Fujitsu in Germany, the appliance is the ideal solution for data centers and remote and branch offices. It allows you to significantly decrease complexity and cost while increasing both scalability and IT agility. Installation, management and upgrades of the pre-designed and integrated solution are all very easy.
 
0 comments | 658 views
April 11, 2019
Since its inception, the FUJITSU Storage ETERNUS CS200c has been known to streamline data protection and management functions in a single integrated solution for the digital world. Industry-leading software from Commvault aligns with potent Fujitsu system technology to provide optimum business efficiency and continuity. Now the appliance is available with an expanded and improved set of configuration and licensing options.
 
0 comments | 1121 views
March 26, 2019
In mid-May 2017, a fast-spreading malware dubbed WannaCry began to wreak havoc on thousands of computer systems worldwide. Targeted towards machines running Windows operating systems, it encrypted data on infected systems and then pressed users to pay a ransom in bitcoins. Soon after the outbreak, researchers accidentally identified a kill switch left by a sloppy coder and used it and its successors to eventually stop the propagation of the program within a matter of 10 days.
 
0 comments | 968 views
 
Page 1/3    1   2   3  
X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now