Data encryption News
November 17, 2016
Will President-elect Trump's transition team follow through on promises to get rid of Dodd-Frank compliance regulations? Also in recent GRC news, tech companies urge Trump to back encryption; and ...
November 15, 2016
Experts debated various aspects of password security in the aftermath of the FriendFinder Network breach, which left 400 million user accounts exposed.
November 14, 2016
Storage updates in OpenStack's Newton release include at-rest data encryption in Swift, a message API for async tasks in Cinder and driver-assisted migration in Manila.
October 27, 2016
NetApp is the first storage vendor to sell Toshiba’s new highly secure solid-state drives (SSDs). NetApp hybrid FAS and E-Series arrays will include Toshiba PXO4S 12 Gb per second SAS SSDs, built ...
Data encryption Get Started
Bring yourself up to speed with our introductory content
There's been a great deal of buzz around the Windows Server 2016 Hyper-V feature, VM shielding. But how exactly does VM shielding work, and what benefits does it bring? Continue Reading
Android device security is getting a boost with its newest version, Android N. Expert Michael Cobb explains the effects on enterprise users, and the changes in encryption. Continue Reading
The Lenovo SHAREit file-sharing app has a hardcoded password vulnerability, among other issues. Expert Michael Cobb explains these flaws and how to prevent exploits on them. Continue Reading
Evaluate Data encryption Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
More and more corporate data is being created and living on mobile devices such as tablets and smartphones. That dynamic requires a new approach to mobile data backup than protecting data stored on traditional servers.
Interest in endpoint and mobile device data protection has intensified as more companies allow workers to use personal computing devices at work.
Once considered an obscure novelty, smartphones and tablets have evolved into powerful tools with increasing storage capacity.
As employees, contractors, partners and other authorized users access and manipulate data wherever they are, IT administrators scramble to ensure that corporate data remains safe and secure. The need for faster restores, more frequent data protection, data growth and other challenges has fueled the search for alternatives to traditional backup technologies.
Mobile data backup technologies range from endpoint backup, file synchronization and sharing products and traditional on-premises backup with options for cloud-based replication.
Mobile devices present significant challenges to backup administrators. Personal tablets and smartphones aren't connected to the corporate network at all times, which means extra effort must be taken to back them up during intermittent periods of connectivity.
Backup storage processes that run against the device must be done in a way that doesn't interfere with the user's normal work activity. Lack of consistency across mobile devices is another challenge.
Organizations need to adopt mobile device usage policies and deploy technologies that enhance data security and mobile device management. Mobile data protection products are often used with tiered storage, in which inactive data is moved automatically to low-cost storage.Continue Reading
VMware debuts new security features, such as Secure Boot and VM Encryption, and added the ability to run any application on the same vSphere host in vSphere 6.5. Continue Reading
Will Google's latest Android operating system benefit enterprises? Upgraded features such as file-based encryption and seamless updates may make Nougat a fit for business. Continue Reading
Manage Data encryption
Learn to apply best practices and optimize your operations.
Enterprises are constantly bombarded by mobile security threats, and it's up to IT pros to thwart them. There are six key items that belong on IT's mobile security checklist. Continue Reading
With the portability of tapes and the ability to store terabytes of data on a single cartridge, appropriate security of tape backup storage is imperative. Continue Reading
HEIST, a new HTTP/2 protocol exploit, can steal encrypted content from HTTPS traffic. Expert Michael Cobb explains how this attack works and how to stop it. Continue Reading
Problem Solve Data encryption Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Destroying a decryption key isn't the same as destroying the data, but which method is more secure? Expert Mike Chapple explains the best way to combat a future encryption flaw. Continue Reading
Ensure protection against ransomware with snapshots and the cloud. Plus, implement stringent controls on backup storage to increase safety from attacks. Continue Reading
Healthcare organizations can protect patient data from breaches with a three-layered approach that combines traditional and advanced protection features. Continue Reading