Data security & protection News
September 27, 2016
Seemingly retaining its original name, technology stack and altogether vibe-ness with competancy over a year now since being acquired by Hitachi Data Systems, Pentaho is putting out the ‘data ...
September 26, 2016
As regulators increasingly seek proof of data integrity, company leaders are realizing that strong records management and compliance business processes can be a revenue driver.
September 23, 2016
StorageCraft will use its new analytics technology to tell its customers to stop backing up certain data. That’s right, the data protection vendor wants its customers to back up less. And ...
September 22, 2016
There's a reason why open source is surfacing with so much prevalence at the enterprise layer... and that reason is data. This is the opinion of Michael Grinich, CEO and co-founder of Nylas -- the ...
Data security & protection Get Started
Bring yourself up to speed with our introductory content
Information security is the set of business processes that protects information assets from being compromised, replicated or destroyed, regardless of its format. Continue Reading
When business intelligence meets mobility, it changes the way IT shops operate. This is why mobile BI is becoming a key cog in the enterprise machine. Continue Reading
Direct and flat backups are part of a recent change in the data protection model. Explore the issues associated with the technologies and which products are implementing them. Continue Reading
Evaluate Data security & protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Tape backup technology has not only stuck around in the storage industry, but has thrived as data has grown. See how tape tackles the competition in this essential guide. Continue Reading
Flat backup, also known as direct backup, is a backup approach based on storage snapshots, and it's gaining popularity.
It allows users to copy data directly from primary storage to secondary storage without the use of a backup server and software.
Its major benefits are simplicity and low cost. However, the approach requires specific technologies and can't protect every resource in an organization.
Direct backup is not entirely new, either. Some vendors have supported it for years. And a number of additional vendors have gotten behind this technology recently. It has become a more viable option in recent years because of improvements in snapshots.
These products rely on redirect-on-write snapshots, which have a lower impact on performance and allow snapshots to be taken more frequently. In all cases, the systems are proprietary, and in most cases are only possible using specific systems. Because of these limitations, flat backup will not be the right approach for many organizations. But in some cases, it can be very useful.
Our Drill Down on flat backup will look at the technology in detail, explain how it works and the hardware that supports it, and discuss possible uses. It will also provide examples of when direct backup is not appropriate to help you decide whether the technology will be effective in your environment.Continue Reading
Cloud access security brokers, or CASBs, are either in-house network gateways or security-as-a-service cloud offerings that inspect network traffic destined for the cloud. This guide equips security pros with the knowledge they need to buy the best CASB platform or service for their company's needs, technological requirements and budget.
CASBs work by examining a network's traffic and determining if sensitive data is being sent to the cloud. CASB technology then applies policies and other security controls to ensure that sensitive data is safe.
This Buyer's Guide on CASB offers an overview of the emerging technology, explains how it works and highlights key features. It includes detailed explanations of the features a CASB should have, but it also has guidelines on some nice-to-have features. Readers will come away with a complete overview of the currently available technology. In short, they will be equipped to launch their IT evaluation process and select the best CASB for their companies.Continue Reading
Manage Data security & protection
Learn to apply best practices and optimize your operations.
A comprehensive data protection plan must feature more than backup. Archiving, snapshots and replication are just a few of the technologies that organizations should consider. Continue Reading
At many hospitals and physician practices, endpoint devices -- such as desktop computers, laptops and smartphones -- can become areas for cybercriminals to exploit. However, a combination of high-tech defense and old-fashioned common sense offer potent protection against endpoint breaches.
This handbook starts off with an article that looks at the security aspects of patient data on mobile devices and how those devices can work with storage technology. It may be best, when possible, to steer clear of storing personal health information on smartphones and tablets. Instead, look to back-end storage options.
Next, readers can learn about HIPAA breaches and endpoint security in a Q&A with a hospital interim CIO. He recommends using multifactor authentication -- in other words, the practices of using at least two different credentials to verify a user's identity -- as a prime way to protect patient data from breaches that could violate HIPAA requirements.
The final article pinpoints the security advantages offered by a virtual desktop infrastructure (VDI), which can help medical facilities sidestep data breaches while physicians use mobile devices.
These high-tech efforts, combined with improved end-user education, can help clinicians and others in hospitals and physician practices avoid lurking digital dangers that threaten endpoints.Continue Reading
The importance of the CISO reporting structure continues to grow as the importance of the CISO grows. Expert Mike O. Villegas discusses who the CISO should report to. Continue Reading
Problem Solve Data security & protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
While ransomware attacks may be nearly impossible to stop, there are important data protection measures your organization can take to recover effectively. Continue Reading
Be aware: Copy data management is easily misunderstood. For example, it is not a true backup and could impact performance. Find out how best to get around these issues. Continue Reading
In a video shot at HIMSS 2016, the CTO of Children's Hospital Los Angeles and a Citrix healthcare executive talk about the benefits of virtualization and security in health IT. Continue Reading