Networking roles

Data encryption News

View All News

Data encryption Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data encryption Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Mobile data backup helped by encryption, data policies

    More and more corporate data is being created and living on mobile devices such as tablets and smartphones. That dynamic requires a new approach to mobile data backup than protecting data stored on traditional servers.

    Interest in endpoint and mobile device data protection has intensified as more companies allow workers to use personal computing devices at work.

    Once considered an obscure novelty, smartphones and tablets have evolved into powerful tools with increasing storage capacity.

    As employees, contractors, partners and other authorized users access and manipulate data wherever they are, IT administrators scramble to ensure that corporate data remains safe and secure. The need for faster restores, more frequent data protection, data growth and other challenges has fueled the search for alternatives to traditional backup technologies.

    Mobile data backup technologies range from endpoint backup, file synchronization and sharing products and traditional on-premises backup with options for cloud-based replication.

    Mobile devices present significant challenges to backup administrators. Personal tablets and smartphones aren't connected to the corporate network at all times, which means extra effort must be taken to back them up during intermittent periods of connectivity.

    Backup storage processes that run against the device must be done in a way that doesn't interfere with the user's normal work activity. Lack of consistency across mobile devices is another challenge.

    Organizations need to adopt mobile device usage policies and deploy technologies that enhance data security and mobile device management. Mobile data protection products are often used with tiered storage, in which inactive data is moved automatically to low-cost storage.

     Continue Reading

  • VMware vSphere 6.5 puts emphasis on security, applications

    VMware debuts new security features, such as Secure Boot and VM Encryption, and added the ability to run any application on the same vSphere host in vSphere 6.5. Continue Reading

  • Will new Android Nougat features make it more enterprise-ready?

    Will Google's latest Android operating system benefit enterprises? Upgraded features such as file-based encryption and seamless updates may make Nougat a fit for business. Continue Reading

View All Evaluate

Manage Data encryption

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Data encryption Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve