Quantum-reTHINK-Backup-Arch

reTHINK Backup & Archive

As the volume of data has increased, there has been a shift in the way that companies use and access that data. That means it’s time to change the way you think about data protection, retention, and accessibility. Organizations of all sizes recognize that data can help gain competitive advantages and even support new revenue […]

PRESS RELEASE: GoBox: A New Business Disaster Recovery Solution from Perpetual Storage

In the event of a disaster, businesses need to have continuity plans already in place so they can be up and running again as soon as possible. However, a plan is useless if it isn’t thorough, secure, and accessible 24/7/365. Perpetual Storage has created a patent pending solution that combines a portable product with consultation […]

rimpro-report

RIMproReport Features PSI’s VP of Sales, Jim Nowa

This week’s RIMproReport with Tom Adams features an interview with Jim Nowa, Perpetual Storage’s Vice President of Sales. Jim Nowa has been with PSI for 31 years. He has been affiliated with many industry organizations over the years and has served as President of the Utah Chapter of ARMA International, President of the Utah Chapter of the Association of Contingency Planners. He […]

me

Two separate reports suggest tape backups provide benefits over disks

At Perpetual Storage we’re constantly on the lookout for resources and information addressing the growing costs and risks associated with backing up valuable information. Of course we’re absolute believers in off-site storage of digital data, especially in our secure solid granite vault. Many of our clients store tape backups, and some keep hard drives and […]

security-officer-badge-300×300

15 laws of business security

We recently ran across an excellent article by Dr. Peter Cochrane on Business Cloud News that addresses security risks at businesses. His case study is eye opening for anyone charged with protecting valuable company information. From his experience, he assembled 15 laws of security. 15 Laws of Business Security Resources are deployed inversely proportional to actual risk […]