Data security & protection News

  • September 27, 2016 27 Sep'16

    Pentaho aims to alleviate big data pains

    Seemingly retaining its original name, technology stack and altogether vibe-ness with competancy over a year now since being acquired by Hitachi Data Systems, Pentaho is putting out the ‘data ...

  • September 26, 2016 26 Sep'16

    New look regs make records management and compliance bsiness drivers

    As regulators increasingly seek proof of data integrity, company leaders are realizing that strong records management and compliance business processes can be a revenue driver.

  • September 23, 2016 23 Sep'16

    StorageCraft buys backup analytics from Gillware

    StorageCraft will use its new analytics technology to tell its customers to stop backing up certain data. That’s right, the data protection vendor wants its customers to back up less. And ...

  • September 22, 2016 22 Sep'16

    Nylas CEO: the secret to software is data enrichment

    There's a reason why open source is surfacing with so much prevalence at the enterprise layer... and that reason is data. This is the opinion of Michael Grinich, CEO and co-founder of Nylas -- the ...

View All News

Data security & protection Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data security & protection Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Why a tape backup system is still a good storage option

    Tape backup technology has not only stuck around in the storage industry, but has thrived as data has grown. See how tape tackles the competition in this essential guide. Continue Reading

  • Direct backup changes rules, cost of backup

    Flat backup, also known as direct backup, is a backup approach based on storage snapshots, and it's gaining popularity.

    It allows users to copy data directly from primary storage to secondary storage without the use of a backup server and software.

    Its major benefits are simplicity and low cost. However, the approach requires specific technologies and can't protect every resource in an organization.

    Direct backup is not entirely new, either. Some vendors have supported it for years. And a number of additional vendors have gotten behind this technology recently. It has become a more viable option in recent years because of improvements in snapshots.

    These products rely on redirect-on-write snapshots, which have a lower impact on performance and allow snapshots to be taken more frequently. In all cases, the systems are proprietary, and in most cases are only possible using specific systems. Because of these limitations, flat backup will not be the right approach for many organizations. But in some cases, it can be very useful.

    Our Drill Down on flat backup will look at the technology in detail, explain how it works and the hardware that supports it, and discuss possible uses. It will also provide examples of when direct backup is not appropriate to help you decide whether the technology will be effective in your environment.

     Continue Reading

  • Picking the best CASB for your enterprise

    Cloud access security brokers, or CASBs, are either in-house network gateways or security-as-a-service cloud offerings that inspect network traffic destined for the cloud. This guide equips security pros with the knowledge they need to buy the best CASB platform or service for their company's needs, technological requirements and budget.

    CASBs work by examining a network's traffic and determining if sensitive data is being sent to the cloud. CASB technology then applies policies and other security controls to ensure that sensitive data is safe.

    This Buyer's Guide on CASB offers an overview of the emerging technology, explains how it works and highlights key features. It includes detailed explanations of the features a CASB should have, but it also has guidelines on some nice-to-have features. Readers will come away with a complete overview of the currently available technology. In short, they will be equipped to launch their IT evaluation process and select the best CASB for their companies.

     Continue Reading

View All Evaluate

Manage Data security & protection

Learn to apply best practices and optimize your operations.

  • Buffington: Data protection plans should contain technology 'spectrum'

    A comprehensive data protection plan must feature more than backup. Archiving, snapshots and replication are just a few of the technologies that organizations should consider. Continue Reading

  • To defend endpoint security in healthcare, technology teams with training

    At many hospitals and physician practices, endpoint devices -- such as desktop computers, laptops and smartphones -- can become areas for cybercriminals to exploit. However, a combination of high-tech defense and old-fashioned common sense offer potent protection against endpoint breaches.

    This handbook starts off with an article that looks at the security aspects of patient data on mobile devices and how those devices can work with storage technology. It may be best, when possible, to steer clear of storing personal health information on smartphones and tablets. Instead, look to back-end storage options.

    Next, readers can learn about HIPAA breaches and endpoint security in a Q&A with a hospital interim CIO. He recommends using multifactor authentication -- in other words, the practices of using at least two different credentials to verify a user's identity -- as a prime way to protect patient data from breaches that could violate HIPAA requirements.

    The final article pinpoints the security advantages offered by a virtual desktop infrastructure (VDI), which can help medical facilities sidestep data breaches while physicians use mobile devices.

    These high-tech efforts, combined with improved end-user education, can help clinicians and others in hospitals and physician practices avoid lurking digital dangers that threaten endpoints.

     Continue Reading

  • What's the best way to organize the CISO reporting structure?

    The importance of the CISO reporting structure continues to grow as the importance of the CISO grows. Expert Mike O. Villegas discusses who the CISO should report to. Continue Reading

View All Manage

Problem Solve Data security & protection Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve