Jason Buffington

Senior Analyst

  • Blogs
    Mar 4, 2015

    What Makes a Good Backup Appliance - Part 2 of 3

    In my earlier post about the characteristics of good backup appliances, I discussed the increasing usage rates of purpose-built backup appliances (PBBAs) by those organizations that embrace them. But after listening to several sessions at IBM Interconnect last week, including discussing our upcoming research report on data protection appliances (DPAs), I started thinking about, what makes up a good backup appliance over simply installing backup software onto a physical server?

  • Blogs
    Mar 3, 2015

    What Makes a Good Backup Appliance - Part 1 of 3

    In general, I am a fan of data protection appliances (DPAs), noting that purpose-built backup appliances (PBBAs) are just one of four categories of DPAs that are in market today.

  • Blogs
    Feb 25, 2015

    What’s New in Data Protection from IBM Interconnect 2015

    Every time that I take a close look at IBM’s data protection portfolio, veiled under its storage solutions umbrella, I am happily surprised by the technology—and my guess is that you would be too.
  • research reports
    Feb 23, 2015

    Data Protection Personas and Methods

    In order to gauge “who is choosing what and how?” when it comes to modern data protection tools, ESG surveyed 305 IT professionals responsible for and/or familiar with their organization’s data protection infrastructure, processes, and strategy, representing large midmarket organizations (defined as organizations with 500 to 999 employees) and enterprise-class (defined as organizations with 1,000 employees or more) organizations in North America. All respondents were required to have purchase decision authority or influence. The goal of the research was to explore the business and IT requirements driving modern data protection strategies, the influencers and stakeholders within their organizations, and the implementation details of their existing and preferred data protection strategies.

  • Blogs
    Feb 13, 2015

    Why Copy Data Management Matters

    In ESG’s Archive & Backup Convergence research, we found that a majority of IT organizations are either using or looking at solutions that managed the “copy data” within their environment:
  • Blogs
    Feb 10, 2015

    The Challenges and Benefits of Virtualization Protection

    Last week, my article in Windows IT Pro on “Virtualize Everything” stimulated a rather wide range of banter:

  • video
    Feb 6, 2015

    ESG 360: ESG 2015 Predictions - Data Protection

    ESG VP of Research John McKnight interviews Senior Analyst Jason Buffington on his 2015 predictions for the Data Protection segment.

  • Blogs
    Feb 5, 2015

    Data Protection Predictions for 2015

    Last month, I sat down with my colleague, John McKnight, in an ESG 360 video to share my predictions on how data protection will or should change in 2015 … in five minutes or less:

  • Blogs
    Jan 28, 2015

    Welcome Back, Veritas! The Truth Is Still the Truth

    Today, Symantec announced that the Information Management (Data Protection) side of Symantec will be called Veritas Technologies Corporation. Frankly, if they had chosen anything else, I would have been disappointed.
  • Blogs
    Jan 26, 2015

    You Can Prepare for Tomorrow's IT Disaster Today

    This week, many of my colleagues are preparing for Winter Storm Juno. One of my compatriots actually warned his friends on Facebook that he was going to run around supermarket aisles telling folks “We’re all going to die!!”
  • News
    Jan 14, 2015

    Asigra Cloud Backup will add Docker support in next version - TechTarget

  • Blogs
    Dec 11, 2014

    SaaS Backup ... Hunger Games style

    There is a great scene in the first Hunger Games movie where the 24 combatants are just about to start fighting. In front of them is a small stash of weapons. Some of the combatants charge toward the weapons, knowing that if they get one, they will gain a huge advantage—but if they don’t, they will be prime targets for being immediately “defeated.” Other combatants choose to ignore the premade weapons and run for the forest, presuming that they will be able to forage and somehow make a weapon themselves.
  • esg video capsules
    Dec 9, 2014

    ESG Video Capsule: EVO Rail Data Protection Series - Part 7 of 7

    Channel Considerations for EVO RAIL

    In Part 7 of this ESG Video Capsule series on EVO RAIL Protection, ESG Senior Analyst Jason Buffington discusses the considerations of EVO RAIL solutions for Channel Partners.

  • Blogs
    Dec 9, 2014

    Why Change Control Matters: What Not To Do in E-mail Protection – part 2 of 5 (Tuesday)

    All this week, I am dissecting an IT horror story from a friend of mine, whose IT team turned on archaic archiving for their cloud-based mail service … and hopefully gleaning lessons from it.
  • Blogs
    Dec 8, 2014

    What Not To Do in E-mail Protection – part 1 of 5 (Monday)

    John (not his real name) logged in Monday morning to find that several of his mail folders had far less stuff in them. In fact, in very small font, he discovered his Outlook now showing “Global Retention Policy = 6 months” … and yes, everything older than six months was now in a very archaic e-mail archiving service that was long since presumed retired.

More Results:



Jason Buffington focuses primarily on data protection, along with Windows Server infrastructure, management and virtualization. He has concentrated on data protection and availability technologies since 1989 and has been a Certified Business Continuity Planner (CBCP), a Microsoft Certified Systems Engineer and Trainer (MSCE/MCT), and a Microsoft MVP in file system and storage solutions.

Full Biography


Enter your email address, and click subscribe