Blog

  • When isolation protocols activate, your endpoints become a problem

    When isolation protocols activate, your endpoints become a problem

    IGEL might be the most interesting business continuity technology you haven’t considered yet. When isolation protocols activate, endpoint access for the people who need it most becomes an immediate problem. Your IR team. Your senior leadership. Your recovery coordinators. Most BC/DR plans recognize it; very few solve it elegantly. That gap is what drew my…

  • What to look for as the Data Protection Market evolves

    What to look for as the Data Protection Market evolves

    The more time I spend with investors, consultants, and business stakeholders, the conversation keeps circling back to the same questions: “Who are the likely #DataProtection leaders for the enterprise over the next few years, and why is the market shifting the way it is?“

  • Let’s talk about the Server-to-Server Data Gap

    Let’s talk about the Server-to-Server Data Gap

    When Certes dropped their announcement last week, it got me thinking about a gap that most data protection and cyber resilience teams haven’t fully reckoned with yet — and it’s not the one you’re probably thinking of. Server-to-server data flows are largely unprotected in most environments; and sophisticated adversaries are already harvesting that traffic today…

  • Run Windows on the good days, Run IGEL on the bad days  (part one)

    Run Windows on the good days, Run IGEL on the bad days  (part one)

    Here’s a Cyber Resilience isolation mechanism that you may not have heard about yet but really ought to consider as part of your Business Continuity strategy. HINT: Run Windows on the good days, run IGEL on the bad days

  • DRJ Spring 2026 Wrap-up on Backup

    DRJ Spring 2026 Wrap-up on Backup

    Not all conferences are created equal. Here’s what DRJ Spring 2026 gets right—and why it matters.