Archive of month: February 2018

Three critical steps to help maximize All-flash performance

All-flash storage infrastructures are famous for increasing performance.  As a matter of fact, 70% of enterprises choose AFAs for transformative IOPs and reduced application latency.1  However, not all flash solutions are created equally. Read more about how to maximize your all-flash performance here: https://kaminario.com/company/blog/three-critical-steps-to-maximize-all-flash-performance/

3 Reasons Why Flash Should Be Front and Center in Your Storage Strategy

The rapid rise of flash to the top of the storage agenda is not surprising, given the advances we’ve seen in this technology over the past few years. Performance has improved by leaps and bounds, and the price decline curve has been steep. Density has been climbing steadily, with 3.84 TB solid-state drives (SSDs) now […]

The New DDoS Landscape

News outlets and blogs will frequently compare DDoS attacks by the volume of traffic that a victim receives. Surely this makes some sense, right? The greater the volume of traffic a victim receives, the harder to mitigate an attack – right? At least, this is how things used to work. An attacker would gain capacity […]

Email Security that Meets Government Standards

Nation state actors, cyber criminals, hacktivists and other attackers continue to set their sights on government organizations. In 2017 alone, breaches were reported on the federal level at a major military branch, on the state level at a Division of Medicaid and Department of Motor Vehicles, and on the local level at a County Clerk’s […]

Email Security: A Buyer’s Guide

Today’s attackers seem to be using malicious emails more than anything else to infect their targets. Many of these sophisticated, malevolent messages trick users into clicking links, downloading attachments, sharing credentials or taking some action that activates ransomware, installs malware or gives cyber criminals access to business networks. Traditional signature-based and reputation-based defenses such as […]

The Power of Incident Response Technology

…incident response teams can deploy a mix of technologies to meet a customer’s investigative needs, and many of these same technologies have defensive capabilities that help protect the environment against additional attacks during the investigation. Read more about how incident response can help companies develop a quick reaction after a breach: https://www.fireeye.com/blog/products-and-services/2017/12/the-power-of-incident-response-technology.html

Getting Strategic with Copy Data Management

The amount of data collected and processed by businesses has grown exponentially. Adding to this increase, a recent study performed by IDC cites the average number of copies per piece of data is 13. As you can imagine, this growth of data and copy data uses up storage space and can hinder performance. In fact, […]

The Need for Symb-IoT-ic Relationships Across IT and LoB teams in IoT and OT Security

Who is ultimately responsible for protecting Industrial Internet of Things (IIoT) and operational technology (OT) equipment as businesses rush toward digital transformation? All CxOs should be asking their internal teams who are responsible for IT and OT security the same question. Read about the breaches concerning IoT and the importance of cooperation when it comes […]

Disaster Recovery in the Cloud, Part 1: Knowing the Options

The traditional approach to DR requires significant investment of time and resources. At minimum, users must consider how they would replicate their primary infrastructure to a secondary site. That secondary site needs to be procured, installed, and maintained. During normal operations, the secondary site will typically be under-utilized or over-provisioned. https://www.rubrik.com/blog/disaster-recovery-cloud-options/