Archives of #data protection

3 Reasons Why Flash Should Be Front and Center in Your Storage Strategy

The rapid rise of flash to the top of the storage agenda is not surprising, given the advances we’ve seen in this technology over the past few years. Performance has improved by leaps and bounds, and the price decline curve has been steep. Density has been climbing steadily, with 3.84 TB solid-state drives (SSDs) now […]

The Power of Incident Response Technology

…incident response teams can deploy a mix of technologies to meet a customer’s investigative needs, and many of these same technologies have defensive capabilities that help protect the environment against additional attacks during the investigation. Read more about how incident response can help companies develop a quick reaction after a breach: https://www.fireeye.com/blog/products-and-services/2017/12/the-power-of-incident-response-technology.html

Getting Strategic with Copy Data Management

The amount of data collected and processed by businesses has grown exponentially. Adding to this increase, a recent study performed by IDC cites the average number of copies per piece of data is 13. As you can imagine, this growth of data and copy data uses up storage space and can hinder performance. In fact, […]

The Need for Symb-IoT-ic Relationships Across IT and LoB teams in IoT and OT Security

Who is ultimately responsible for protecting Industrial Internet of Things (IIoT) and operational technology (OT) equipment as businesses rush toward digital transformation? All CxOs should be asking their internal teams who are responsible for IT and OT security the same question. Read about the breaches concerning IoT and the importance of cooperation when it comes […]

Enterprise Data Security: 4 Outcomes to Help Measure Success

The frequency of high-profile data security breaches has increased the urgency to improve digital security in every enterprise. The challenge confronted by all is how to effectively protect critical data in the face of persistent and ever-changing threats from malicious hackers, foreign governments, and criminal ransom schemes. Traditional security strategies have failed to perform. Now […]

Cybersecurity is every IT leader’s job

October is National Cybersecurity Awareness Month, a campaign created by the U.S. Department of Homeland Security to reinforce the importance of Internet security. This year, we hardly need reminding. We have the history-making Equifax breach of late September to thank. The breach of the credit reporting company’s repositories compromised personal data of more than 145 million people, […]