Welcome to the StorMagic Blog

Making the complex simple

News, opinion and technical coverage from the edge to the core

An Introduction to Trusted Computing: What It Is and How StorMagic Is Utilizing It with SvKMS
An Introduction to Trusted Computing: What It Is and How StorMagic Is Utilizing It with SvKMSWhat is Trusted Computing? Trusted Computing is a broad term that refers to technologies and proposals that aims to make computing more secure through hardware enhancements and associated software modifications. It can be broken down into four different categories: Memory Curtaining: Provides full isolation of sensitive areas of memories, and keeps memory from being read […]Read More
Visit StorMagic at HPE Discover 2021: Enter Our Daily $100 Giveaway, Connect With Us During Our Live Office Hours, and More!
Visit StorMagic at HPE Discover 2021: Enter Our Daily $100 Giveaway, Connect With Us During Our Live Office Hours, and More!HPE Discover 2021, a free virtual event, takes place this week (June 22-24) and StorMagic is thrilled to announce that we will be exhibiting at the show!  About HPE Discover  Attendees that register for HPE Discover will gain access to an exclusive experience and vast assortment of valuable resources. This unique event, which is anticipated […]Read More
Happy 15th Birthday StorMagic: 15 Things You Didn’t Know about the Company
Happy 15th Birthday StorMagic: 15 Things You Didn’t Know about the CompanyFounded in June 2006, StorMagic is proud to be celebrating its 15th anniversary this month. In honor of turning 15 years old, we pulled together the following blog post, providing our readers with a list of 15 things you didn’t already know about StorMagic — but wish you did. 15 Things You Didn’t Know About […]Read More
The StorMagic SvSAN Container Storage Interface: Making the Edge Ready for Containers
The StorMagic SvSAN Container Storage Interface: Making the Edge Ready for ContainersAccording to Gartner, by 2025 more than 85% of global organizations will be running containerized applications in production. Container adoption is on the rise, with edge computing environments as the next frontier for containers adoption.  To help customers deploy containers at the edge, we are thrilled to announce the availability of a new offering — […]Read More
Shop in a Box: StorMagic and APC by Schneider Electric Deliver Lean, Affordable Storage for Retail Environments
Shop in a Box: StorMagic and APC by Schneider Electric Deliver Lean, Affordable Storage for Retail EnvironmentsStorMagic and APC by Schneider Electric’s all-inclusive Shop in a Box solution is the leanest edge computing retail solution on the market. This one-of-a-kind offering enables retail stores to process, manage and store data in minutes. It is ideal for retailers who operate at the network edge where space and resources are often limited, delivering […]Read More
StorMagic, Zerto and HPE Combine Forces to Ensure Edge-to-Edge Workload Protection
StorMagic, Zerto and HPE Combine Forces to Ensure Edge-to-Edge Workload ProtectionWith the advent of the Internet of Things (IoT), artificial intelligence (AI), and machine learning (ML), the need for computation at the edge is increasing rapidly. Edge computing is becoming more popular around the world for businesses that require compute resources to be closer to data sources, such as remote offices, manufacturing plants, oil refineries, […]Read More
StorMagic Acquires SoleraTec Technology and Launches ARQvault, the First Active Intelligent Repository
StorMagic Acquires SoleraTec Technology and Launches ARQvault, the First Active Intelligent RepositoryHave you heard the big news? StorMagic has acquired the assets of SoleraTec, a video and digital asset management software company, and launched a new solution, StorMagic ARQvault. This announcement marks an important milestone in StorMagic’s history, as we’ve released a new product completely unlike any other solution we’ve developed before and entered an entirely […]Read More
StorMagic Introduces SvKMS Editions, Enabling Customers to Purchase Right-Priced Encryption Key Management
StorMagic Introduces SvKMS Editions, Enabling Customers to Purchase Right-Priced Encryption Key ManagementStorMagic understands that each organization has different needs when it comes to encryption key management, which is why we’ve introduced three new tiers for our SvKMS solution, as well as a new pricing model.  We’ve also released a new update to SvKMS — version 2.6. This latest edition of SvKMS includes new integrations and an […]Read More
Gather, Store and Find Your Digital Evidence, with StorMagic ARQvault Digital Evidence Management Solutions
Gather, Store and Find Your Digital Evidence, with StorMagic ARQvault Digital Evidence Management SolutionsThe proliferation of digital technology has led to a proliferation of digital evidence: images, texts, emails, documents, video, audio, and more. Digital evidence is everywhere and its use is no longer restricted to law enforcement and public agencies. Transportation providers are using in-vehicle cameras, delivery and service providers are using both in-vehicle and body cameras […]Read More
Data Compliance – A Beginner’s Guide
Data Compliance – A Beginner’s GuideCybersecurity is a term used to describe the practice of defending networks, devices, applications, and data from unauthorized access and cyber threats. It consists of a variety of different technologies, tools, processes, and approaches, for ensuring data integrity, confidentiality, and availability.Read More
StorMagic Expands Partnership with Nutanix, Introducing New Product Validations with SvKMS
StorMagic Expands Partnership with Nutanix, Introducing New Product Validations with SvKMSStorMagic has joined the Nutanix Elevate Technology Alliance Partner Program, and our encryption key management solution, SvKMS, has been validated with Nutanix data encryption and their AHV hypervisor.  What Does This Mean?  SvKMS has been named a Nutanix Ready validated solution, for customers looking to implement a third party key manager with Nutanix built-in encryption, […]Read More
Watch Your Assets with ARQvault Video Surveillance Solutions
Watch Your Assets with ARQvault Video Surveillance SolutionsThese days, video surveillance is everywhere – retail stores, parking lots, warehouses, manufacturing sites, hospitals, government facilities, airports, train stations, corporate campuses, schools, stadiums, and more. The term “video surveillance” often conjures something serious and nefarious, which can sometimes be the case. But what it typically equates to is watching out for your assets — […]Read More
StorMagic Proudly Announces Active Archive Alliance Sponsorship, Following Introduction of ARQvault
StorMagic Proudly Announces Active Archive Alliance Sponsorship, Following Introduction of ARQvaultEarlier this week, we announced that StorMagic joined the Active Archive Alliance. We are excited to be a part of this unique organization, which is dedicated to providing end-users with technical expertise and guidance to design and implement modern solutions for data growth challenges. StorMagic is in good company as a new sponsor of the […]Read More
Three Cheers for StorMagic! The StorMagic Channel Program Receives a 5-Star Rating in the CRN Partner Program Guide, Once Again
Three Cheers for StorMagic! The StorMagic Channel Program Receives a 5-Star Rating in the CRN Partner Program Guide, Once AgainLast week, we proudly announced that StorMagic received a 5-star rating in the 2021 CRN Partner Program Guide — for the third year running. StorMagic is dedicated to providing its partners with high-quality tools to facilitate a hassle-free selling process, when positioning its products in opportunities. We are a 100% channel focused company and are […]Read More
StorMagic Expands VMware Ready Partnership with SvKMS Certification and Marketplace Listing
StorMagic Expands VMware Ready Partnership with SvKMS Certification and Marketplace ListingUnder its vSphere 6.5 release, VMware enabled the ability to encrypt VMs for data-at-rest encryption, a tried-and-true data security approach. This capability has continued through vSphere versions 6.7 and 7.0, and is now available for vSAN encryption. While VMware has made turning on encryption easy, customers require a third-party key management server (KMS) that supports […]Read More
The 2021 Data Breakthrough Awards Names StorMagic Witness as-a-Service as the “Overall Data Storage Solution of the Year”
The 2021 Data Breakthrough Awards Names StorMagic Witness as-a-Service as the “Overall Data Storage Solution of the Year”StorMagic’s Witness as-a-Service (WaaS) product was recognized as the “Overall Data Storage Solution of the Year” in the 2021 Data Breakthrough Awards. We are so thrilled to be celebrating this achievement, and to be acknowledged as a leader in the data storage space! The Data Breakthrough Awards recognize the best companies, products and services in […]Read More
All About Hypervisors — Part I: Differences Between vSphere, KVM, Hyper-V and XenServer
All About Hypervisors — Part I: Differences Between vSphere, KVM, Hyper-V and XenServerStorMagic has a long history of supporting compatibility with many different server vendors and hypervisors, for our high availability storage solution, SvSAN. Hypervisors provide the foundation for virtualization platforms and there are several options to pick from, from traditional vendors to open source alternatives. VMware is a popular choice for virtualization, along with the ESXi […]Read More
Rommelsbacher Eliminates Single Point of Failure and Ensures Maximum Uptime with StorMagic SvSAN
Rommelsbacher Eliminates Single Point of Failure and Ensures Maximum Uptime with StorMagic SvSANFor more than 90 years, Rommelsbacher has been designing and producing electric appliances, and delivering them to countries around the world. Based in Germany, the company is family-owned and is dedicated to manufacturing first class kitchen products that provide “Pure Cooking Pleasure,” and are both functional and aesthetically pleasing.  Rommelsbacher was looking to upgrade its […]Read More
Cybersecurity – A Beginner’s Guide
Cybersecurity – A Beginner’s GuideCybersecurity is a term used to describe the practice of defending networks, devices, applications, and data from unauthorized access and cyber threats. It consists of a variety of different technologies, tools, processes, and approaches, for ensuring data integrity, confidentiality, and availability.Read More
StorMagic Proudly Claims Gold in the 2021 Cybersecurity Excellence Awards
StorMagic Proudly Claims Gold in the 2021 Cybersecurity Excellence AwardsWe are excited to announce that StorMagic was selected as a gold winner in two different categories of the 2021 Cybersecurity Excellence Awards. StorMagic KMaaS was awarded gold in the “Cybersecurity Product / Service Awards — Data Security” category, and SvKMS in the “Cybersecurity Industry Solutions Awards — Manufacturing” category.  Each year, Cybersecurity Insiders hosts […]Read More
Commvault Certifies StorMagic SvKMS as a Third-Party Encryption Key Management Solution
Commvault Certifies StorMagic SvKMS as a Third-Party Encryption Key Management SolutionWe are excited to announce that SvKMS is now officially certified as a third-party encryption key management solution for Commvault encrypted backups.  Commvault is a data management company that specializes in backup and recovery, cloud and infrastructure management, retention, and compliance. Nowadays, there is an increased need to protect data that exists in disparate environments […]Read More
CRN Names StorMagic CRO, Brian Grainger, a 2021 Channel Chief
CRN Names StorMagic CRO, Brian Grainger, a 2021 Channel ChiefEach year, CRN, a brand of the Channel Company, releases a list of leading IT channel vendor executives who continually demonstrate outstanding leadership, influence, innovation, and growth — i.e. CRN Channel Chiefs.  StorMagic is thrilled to announce that our CRO and Board Member, Brian Grainger, was included in this year’s list. To celebrate this achievement, […]Read More
StorMagic KMaaS: Simple Encryption Key Management for Any Environment (On-Prem, Cloud, Multi-Cloud, and Hybrid)
StorMagic KMaaS: Simple Encryption Key Management for Any Environment (On-Prem, Cloud, Multi-Cloud, and Hybrid)According to the research firm Gartner, the events of 2020 have accelerated cloud adoption to the point that technology leaders should follow “cloud first” as a guiding principle. However, while “cloud first” may be the new standard, data still exists in multiple locations across the enterprise and a “security first” paradigm goes hand-in-hand with cloud […]Read More
BYOK – A Beginner’s Guide
BYOK – A Beginner’s GuideBring Your Own Key (BYOK), also referred to as Customer Supplied Encryption Keys (CSEK), is a model of encryption key management that enables customers to take full control of their encryption keys when storing data in the cloud. It allows them to use their own encryption key management software to store their encrypted keys outside of the cloud, instead of in the cloud, alongside their data.Read More
Mitigating the Impact of Green IT Initiatives on High Availability
Mitigating the Impact of Green IT Initiatives on High AvailabilityOrganizations around the world are becoming more reliant on technology for everyday operations, and the demand for IT resources continues to grow exponentially. Many of today’s IT managers are faced with the challenge of implementing solutions that reduce their organization’s carbon footprints, without sacrificing performance or productivity. In this blog, we share several tips on […]Read More
StorMagic Expands OEM Agreement with ARIA Cybersecurity to Deliver the Industry’s Smallest General-Purpose HSM
StorMagic Expands OEM Agreement with ARIA Cybersecurity to Deliver the Industry’s Smallest General-Purpose HSMStorMagic has expanded our original equipment manufacturer (OEM) agreement with ARIA Cybersecurity Solutions, a business of CSPi. ARIA Cybersecurity is now able to embed StorMagic SvKMS enterprise key management software to deliver their ARIA microHSM product through channel partners worldwide. Through this expanded partnership, ARIA Cybersecurity is now delivering the industry’s smallest general purpose hardware […]Read More
With Its Sights Set on the Edge, StorMagic Hits the Target as a Leading Contender in GigaOm’s HCI Radar Report
With Its Sights Set on the Edge, StorMagic Hits the Target as a Leading Contender in GigaOm’s HCI Radar ReportWe are thrilled to announce that we were selected as a top performer in the “GigaOm Radar for Hyperconverged Infrastructure: Small-to-Medium Enterprises and Edge” report. With 13 total HCI vendors in the running, GigaOm selected StorMagic SvSAN as a leading solution for SMEs and edge computing sites.  GigaOm is a technology research and analysis company, […]Read More
Is There Still a Place for HSMs in Modern Data Protection?
Is There Still a Place for HSMs in Modern Data Protection?Hardware Security Modules (HSMs) have been the standard for encryption for the last 20 years. But with the emergence of computing that spans on-prem, cloud and edge environments, there has been a shift away from physical, on-premise HSMs to software-based key management systems. With that said, are HSMs still relevant? Is an HSM best for […]Read More
What’s In Store for IT in 2021? StorMagic’s Predictions on Edge, Security, and More
What’s In Store for IT in 2021? StorMagic’s Predictions on Edge, Security, and More2020 is coming to a close, and oh what a year it has been. Over the past 12 months, the Coronavirus pandemic swept the globe and changed the world significantly. COVID-19 not only had an impact on our personal lives, but also our work lives.  Many employees were forced to transition to remote work, which […]Read More
StorMagic Recognized in CRN’s 2020 Edge Computing 100 List
StorMagic Recognized in CRN’s 2020 Edge Computing 100 ListWe are thrilled to announce that CRN®, a brand of The Channel Company, included StorMagic in its first ever 2020 Edge Computing 100 list. This new list, selected by a panel of respected CRN editors, recognizes leading vendors whose technology provides the building blocks channel partners need to build next-generation intelligent edge solutions that bring […]Read More
High Availability’s Role in Protecting Data and Improving Performance
High Availability’s Role in Protecting Data and Improving PerformanceHigh availability (HA) is vital to protecting sensitive data, and an important part of key management. Key management is central to data encryption – encryption keys are like the keys to your house, and act to protect your valuables (the encrypted data). But, much like standard house keys, key management has a number of potential […]Read More
KMIP – A Beginner’s Guide
KMIP – A Beginner’s GuideThe Key Management Interoperability Protocol (KMIP) is a universal language for secure data management across platforms. It was developed by the Organization for Advancement of Structured Information Standards (OASIS), with the purpose of enabling communication between key management systems and cryptographically-enabled applications.Read More
Gartner Magic Quadrant for Hyperconverged Infrastructure 2020: StorMagic Recognized as a Niche Player
Gartner Magic Quadrant for Hyperconverged Infrastructure 2020: StorMagic Recognized as a Niche PlayerGartner has released its annual Magic Quadrant for Hyperconverged Infrastructure (HCI) research note, and StorMagic is proud to have been recognized in the report for its ability to execute and completeness of vision, for the third time.  As in reports prior, StorMagic was identified as a “Niche Player” in the 2020 Magic Quadrant, which we […]Read More
StorMagic is Named “Hyperconvergence Vendor of the Year” in the 2020 Storage Awards
StorMagic is Named “Hyperconvergence Vendor of the Year” in the 2020 Storage AwardsStorMagic is excited to announce that we’ve been named a winner in the 2020 Storage Awards. We were selected as the winner in the “Hyperconvergence Vendor of the Year” category, recognizing our SvSAN product, which enables highly available virtualized storage within hyperconverged infrastructures (HCIs).  In 2019, StorMagic was named a runner up in the “Software-Defined […]Read More
New White Paper: 6 Technology Trends that Improve Data Security for Any Cloud
New White Paper: 6 Technology Trends that Improve Data Security for Any CloudThe popularity of cloud computing continues to grow, with many of today’s businesses moving their data and applications from traditional datacenters to the cloud. In fact, Gartner analysts estimate the worldwide cloud services market to be $258 billion in 2020, and grow to $513 billion by 2024. While the cloud offers many benefits to organizations, […]Read More
Cyber Resilience – A Beginner’s Guide
Cyber Resilience – A Beginner’s GuideWhile cyber security is incredibly important, organizations are beginning to realize that they need to take their data protection strategies a step further. The term “cyber resilience” is becoming more prevalent, as a means of describing an organization’s ability to continue operating and to uphold the integrity of their data, even in the event of a breach.Read More
Implementing IT Systems within Pharmacies: Challenges, Requirements, and More
Implementing IT Systems within Pharmacies: Challenges, Requirements, and MoreEveryone has made a trip to the pharmacy at some point in their lives. But have you ever stopped to think about the technologies pharmacies utilize and how much data they’re generating, sharing, and storing on a daily basis?  There are many steps that go into the process of getting the right medication into the […]Read More
Protect and Simplify the Edge with StorMagic SvSAN and HPE Edgeline Converged Edge Systems
Protect and Simplify the Edge with StorMagic SvSAN and HPE Edgeline Converged Edge SystemsWe are thrilled to announce that StorMagic has expanded its partnership with Hewlett Packard Enterprise (HPE), through the validation of our virtual SAN software solution, SvSAN, with HPE Edgeline Converged Edge Systems.  Together, StorMagic and HPE are dedicated to designing hyperconverged solutions that are purpose-built for edge computing environments. Edge organizations (i.e. branch offices, retails […]Read More
SvKMS 2.5: Latest Update Delivers Extended Support for Encryption Integrations
SvKMS 2.5: Latest Update Delivers Extended Support for Encryption IntegrationsWe are excited to announce that a new version of SvKMS, StorMagic’s enterprise encryption key management solution, is now available — SvKMS 2.5.   SvKMS 2.5 encompasses several expanded encryption integrations for on-prem, IaaS, and SaaS applications. This latest update provides new support for the Google Cloud External Key Management (EKM) Program, Azure Key Vault Managed […]Read More
Encrypting in MongoDB? You’ll Need a Third Party Key Manager
Encrypting in MongoDB? You’ll Need a Third Party Key ManagerDatabase security is a vital component of an overall data protection strategy, especially for organizations that manage and store highly sensitive data, such as financial information or health records. MongoDB is a non-relational, or noSQL database that has quickly become one of the world’s biggest database players, competing with large incumbent companies like Oracle and Microsoft […]Read More
Lacking an Encryption Key Management Strategy? Your Organization Could Be at Risk of Losing Its Data!
Lacking an Encryption Key Management Strategy? Your Organization Could Be at Risk of Losing Its Data!Many of today’s organizations are producing, sharing, and storing mass amounts of sensitive information on a regular basis. As the volume of critical data being generated and circulated around the globe has increased over time, so too have threats of hacking and cyber attacks. Security and risk management (SRM) staff are being driven by an […]Read More
NEW SvKMS Demos: Initializing a Multi-Node Cluster and Configuring StorMagic SvKMS with Different Applications
NEW SvKMS Demos: Initializing a Multi-Node Cluster and Configuring StorMagic SvKMS with Different ApplicationsStorMagic SvKMS is a one-of-a-kind key management solution, designed specifically for modern encryption infrastructures. It simplifies complex security configurations by providing a centralized, one-stop approach to key management and enables customers to deploy encryption wherever they need it – whether at the edge, datacenter, or cloud. SvKMS delivers the following benefits to customers:  Flexible: SvKMS […]Read More
StorMagic SvSAN: Modern, Virtualized Storage for Banks and Financial Organizations
StorMagic SvSAN: Modern, Virtualized Storage for Banks and Financial OrganizationsBanks and financial services organizations are faced with unique challenges when it comes to IT solutions and managing data. In regard to data storage in particular, financial institutions are often plagued with expensive and outdated architecture, slow speeds, and disruptive downtime. As these organizations begin researching ways to upgrade and modernize their IT, they are […]Read More
Developing Peak Performance for Edge Computing Solutions – From Mountaintops to Micro Data Centers
Developing Peak Performance for Edge Computing Solutions – From Mountaintops to Micro Data CentersWith winter fast approaching, many of us are hoping to get out and enjoy some of the season’s most sought after sports. Recently, as I was considering where best to plan our own family trip, I was reminded of a customer story published by one of our key Alliance Partners, StorMagic. The company is one […]Read More
Encryption – A Beginner’s Guide
Encryption – A Beginner’s GuideEncryption is the process of protecting data by changing it from a readable form to an unreadable form. It uses complex algorithms to “scramble” and therefore protect data - as it’s unreadable and can’t be accessed.Read More
Edge in a Box: Simple, Cost-Effective and Lean Solution Delivers 100% Uptime for Any Edge or Small Datacenter Location
Edge in a Box: Simple, Cost-Effective and Lean Solution Delivers 100% Uptime for Any Edge or Small Datacenter LocationTogether, StorMagic, Schneider Electric, and HPE are revolutionizing the way edge computing environments manage their IT systems. We’ve collaborated to launch a new, all-inclusive solution called “Edge in a Box.” This one-of-a-kind offering enables edge sites to process, manage, and store data in minutes, with one of the leanest solutions on the market. Its low […]Read More
Meet Security and Regulatory Requirements with SvKMS and Nutanix Encryption
Meet Security and Regulatory Requirements with SvKMS and Nutanix EncryptionAs technologies produce new means of creating, using, and benefiting from vast data stores, they also confront new security risks and regulatory requirements — especially for sensitive data.   Nutanix is a cloud computing company, leading the market in hyperconverged infrastructure appliances and software-defined storage. Nutanix’s software delivers a full infrastructure stack that integrates compute, virtualization, […]Read More
The Evolution of Software-Defined Storage and the Virtual SAN
The Evolution of Software-Defined Storage and the Virtual SANHyperconvergence and software-defined-storage (SDS) have come a long way in recent times and branched into areas that were thought impossible, just a few years ago.  IT has always been about eliminating single points of failure. Roll back to the 90s and early 00s when companies ran their applications and services on bare-metal servers; the idea […]Read More
Virtualized Storage – A Beginner’s Guide
Virtualized Storage – A Beginner’s GuideVirtualized storage, or storage virtualization, is a technological concept developed within the past few decades. It enables organizations to remove the traditional boundaries of physical storage devices, by abstracting the disks and drives, and presenting them as a single, centralized pool of storage capacity.Read More
Virtual SAN – A Beginner’s Guide
Virtual SAN – A Beginner’s GuideA virtual storage area network (SAN) is a software-based component that provides a virtualized ‘pool’ of storage to multiple virtual machines (VMs) and applications. In order to achieve this, data is passed (shared) between servers over a network using a protocol such as iSCSI or fibre channel. Read More
Keys to the Kingdom: Consolidating Encryption Key Management with StorMagic SvKMS
Keys to the Kingdom: Consolidating Encryption Key Management with StorMagic SvKMSAs the volume of data being created, managed and stored by organizations around the world increases and diversifies, it becomes ever more important to have a data security and protection plan in place.  Encryption is a tried-and-tested form of data protection. However, one of the challenges of effective data encryption involves the security, storage, and […]Read More
Ensure Strong Data Protection by Combining StorMagic SvKMS and Commvault Encrypted Backups
Ensure Strong Data Protection by Combining StorMagic SvKMS and Commvault Encrypted BackupsData is the lifeblood of an organization. Whether it be customer data stored in a database, or a record of transactions that’s part of a larger order management system, data is what fuels the modern enterprise. As more and more companies store their data across the cloud, multiple clouds, and hybrid-systems, protecting that data has […]Read More
An Introduction to Regulatory Compliance and Data Protection
An Introduction to Regulatory Compliance and Data ProtectionWith personal data becoming more important and bountiful in a digital and virtual world, the importance of regulatory compliance and data protection, storage, and management has also increased. Major regulations exist in several specific sectors, including, in the US, healthcare (HIPAA and HiTech), financial services (PCI-DSS and GLBA), biotechnology (FDA) and the energy industry, and […]Read More
Hardware vs. Software RAID: How to Make a Wise Choice
Hardware vs. Software RAID: How to Make a Wise ChoiceRapid developments in digital and mobile technologies are making edge computing more prevalent and critical to the success of businesses across a wide range of industries. Organizations that are implementing edge computing technology are commonly faced with deciding which is better suited for their environment – hardware or software RAID. But how do you know […]Read More
Mt. Hood Ski Resort Reduces Hardware Requirements and Costs by 33% with StorMagic SvSAN
Mt. Hood Ski Resort Reduces Hardware Requirements and Costs by 33% with StorMagic SvSANBased in Oregon, Mt. Hood Meadows Ski Resort offers visitors skiing, snowboarding, and panoramic views from its 7,300-foot elevation. The resort was previously utilizing a physical SAN appliance to manage its point-of-sale transactional data. They decided to update and virtualize their IT environment with HPE StoreVirtual, which was later discontinued. Earlier this year, StorMagic’s SvSAN virtual […]Read More
Gartner Peer Insights Voice of the Customer Report for Hyperconverged Infrastructure Vendors
Gartner Peer Insights Voice of the Customer Report for Hyperconverged Infrastructure VendorsEach year, Gartner Peer Insights releases its “Voice of the Customer” reports, compiling peer reviews and ratings of vendors received across more than 300 different markets, and complementing those reviews with expert research. The purpose of these “Voice of the Customer” reports is to help guide decision makers during their buying processes, by supplying them […]Read More
Looking to Reduce Your IT Budget? Consider Switching to a Virtual SAN
Looking to Reduce Your IT Budget? Consider Switching to a Virtual SANThere are a number of benefits associated with transitioning from traditional, physical storage infrastructure and switching to a virtual SAN (virtual storage network). However, one of the most notable and advantageous for organizations, at the edge and beyond, is the significant cost savings delivered by making the switch.  Traditional datacenter models require a physical NAS […]Read More
Introducing StorMagic KMaaS: Painless, Cloud-Based Security for any Encryption Workload
Introducing StorMagic KMaaS: Painless, Cloud-Based Security for any Encryption WorkloadMany of today’s businesses are moving their data and applications from onsite datacenters to the cloud. Leveraging cloud services can provide a variety of customer benefits, including improved performance, reduced capital expenses, and increased business agility. At the same time however, cloud services have introduced a number of new vulnerabilities and security risks. In the […]Read More
Best Practices For Encryption Key Management When Storing Data in the Cloud
Best Practices For Encryption Key Management When Storing Data in the CloudThe proliferation of cloud-based services has radically simplified day-to-day data management and decreased overhead costs for many businesses. It is currently estimated that more than 60% of organizations have moved to cloud-based data systems, with many using the cloud to store sensitive information. At the same time however, cloud technology has brought with it a […]Read More
Ecommerce Merchants: Stay Resilient in the Face of Downtime and Cyber Threats
Ecommerce Merchants: Stay Resilient in the Face of Downtime and Cyber ThreatsEcommerce has become a critical pillar of the global economy. Prior to the current pandemic, 2 billion people were buying from over 7 million online businesses according to etailinsights. As COVID-19 has progressed, brick-and-mortar businesses around the globe have adopted many new precautions and regulations to keep their customers safe. This includes transitioning to primarily, […]Read More

Search the StorMagic Blog

 

Stay up-to-date on all things StorMagic by subscribing below:

 

By clicking submit above, you consent to allow StorMagic to store and process the personal information submitted and for StorMagic to contact you via telephone and email in relation to your request. StorMagic is committed to protecting and respecting your privacy, and we’ll only use your personal information to provide the products and services you requested from us. You may unsubscribe from StorMagic marketing communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Data Protection Policy.