Data encryption News
February 16, 2017
Experts at RSAC 2017 discussed national cybersecurity policy suggestions for the new presidential administration, including what to do about encryption and the DHS mission.
February 13, 2017
Rubrik plans a first-quarter software update to enable its Cloud Data Management platform to support physical Windows servers, software-based encryption and customized reports.
January 31, 2017
The processes for keeping data safe when employees leave a company are fundamental data protection best practices: backup, archive and encryption. Yet barely half of the organizations that took ...
January 27, 2017
News roundup: Half of Americans don't trust federal government security. Plus, a Kaspersky Lab manager was arrested; an internal DOD network was found vulnerable; and more.
Data encryption Get Started
Bring yourself up to speed with our introductory content
To secure the exploding number of IP connected created by IoT, big data and cloud services, connections must be underpinned by encryption and a VPN. Continue Reading
There's been a great deal of buzz around the Windows Server 2016 Hyper-V feature, VM shielding. But how exactly does VM shielding work, and what benefits does it bring? Continue Reading
Android device security is getting a boost with its newest version, Android N. Expert Michael Cobb explains the effects on enterprise users, and the changes in encryption. Continue Reading
Evaluate Data encryption Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Putting thousands of cores to work makes perfect sense when you're powering a video game. But graphics processing units, or GPUs, can't serve much practical purpose in a corporate data center, can they?
The GPU vs. CPU discussion isn't as odd as it sounds. In fact, a more broad application of GPUs in the data center can provide the processing punch that CPUs simply cannot. With tasks where data can be processed in parallel rather than in sequence, GPUs might be a particularly valuable tool. The cover story in this issue of Modern Infrastructure looks at scenarios where simultaneous processing can be just what's needed, such as with machine learning and artificial intelligence.
This month's Modern Infrastructure also looks at how data can be protected while in the data center. Full encryption is seemingly a perfect defense for data theft. But that's a difficult -- and, to some, an unrealistic-- road to travel. We look at how an IT team can better safeguard its data, factoring in costs, the tools available and the tradeoffs involved in hack-proofing an organization's data.
And what about the vulnerabilities that arise from within your business? We examine the risk of data loss posed by the shadow IT phenomenon, an ongoing and ever-changing challenge.
It's clear that data is an increasingly valuable resource. Processing it and keeping it safe -- whether that entails taking up the question of GPU vs. CPU for certain workloads or upgrading encryption -- need to be priorities for IT professionals in organizations of all sizes and types.Continue Reading
More and more corporate data is being created and living on mobile devices such as tablets and smartphones. That dynamic requires a new approach to mobile data backup than protecting data stored on traditional servers.
Interest in endpoint and mobile device data protection has intensified as more companies allow workers to use personal computing devices at work.
Once considered an obscure novelty, smartphones and tablets have evolved into powerful tools with increasing storage capacity.
As employees, contractors, partners and other authorized users access and manipulate data wherever they are, IT administrators scramble to ensure that corporate data remains safe and secure. The need for faster restores, more frequent data protection, data growth and other challenges has fueled the search for alternatives to traditional backup technologies.
Mobile data backup technologies range from endpoint backup, file synchronization and sharing products and traditional on-premises backup with options for cloud-based replication.
Mobile devices present significant challenges to backup administrators. Personal tablets and smartphones aren't connected to the corporate network at all times, which means extra effort must be taken to back them up during intermittent periods of connectivity.
Backup storage processes that run against the device must be done in a way that doesn't interfere with the user's normal work activity. Lack of consistency across mobile devices is another challenge.
Organizations need to adopt mobile device usage policies and deploy technologies that enhance data security and mobile device management. Mobile data protection products are often used with tiered storage, in which inactive data is moved automatically to low-cost storage.Continue Reading
VMware debuts new security features, such as Secure Boot and VM Encryption, and added the ability to run any application on the same vSphere host in vSphere 6.5. Continue Reading
Manage Data encryption
Learn to apply best practices and optimize your operations.
There is so much to keep in mind with Windows 10 security it's easy to overlook the essentials. Get back to basics and remember to keep an eye on updates, encryption and users. Continue Reading
Before wading into a data lake to help with protection, it's important to analyze what you're doing with your data and its backup and disaster recovery. Continue Reading
Enterprises are constantly bombarded by mobile security threats, and it's up to IT pros to thwart them. There are six key items that belong on IT's mobile security checklist. Continue Reading
Problem Solve Data encryption Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Signal app, used for end-to-end encrypted mobile messaging, contained a bug that allowed data to be added to attachments. Expert Michael Cobb explains the flaw. Continue Reading
The Stampado ransomware is a low-cost threat to networks and external drives. Expert Matthew Pascucci explains how Stampado works and how enterprises should handle it. Continue Reading
A recent survey illustrates how extensive ransomware threats have been, and Rich Castagna says backing up data remains your best defense Continue Reading