Data encryption News
March 10, 2017
News roundup: Report on zero-day vulnerabilities questions government stockpiling. Plus, Comey talks encryption and privacy, FCC blocks consumer protection rule, and more.
February 28, 2017
Datrium's Blanket Encryption software encrypts deduplicated and compressed data from servers to storage, but doesn't yet support third-party key management products.
February 16, 2017
Experts at RSAC 2017 discussed national cybersecurity policy suggestions for the new presidential administration, including what to do about encryption and the DHS mission.
February 13, 2017
Rubrik plans a first-quarter software update to enable its Cloud Data Management platform to support physical Windows servers, software-based encryption and customized reports.
Data encryption Get Started
Bring yourself up to speed with our introductory content
To secure the exploding number of IP connected created by IoT, big data and cloud services, connections must be underpinned by encryption and a VPN. Continue Reading
There's been a great deal of buzz around the Windows Server 2016 Hyper-V feature, VM shielding. But how exactly does VM shielding work, and what benefits does it bring? Continue Reading
Android device security is getting a boost with its newest version, Android N. Expert Michael Cobb explains the effects on enterprise users, and the changes in encryption. Continue Reading
Evaluate Data encryption Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
VDI environments are in danger of ransomware attacks. They can encrypt personal and professional data that cannot be decoded once the user's session ends. Continue Reading
Encryption is just one important element of backup data security in the cloud. Ask the right questions of your organization and your cloud provider to make sure your data is safe. Continue Reading
Putting thousands of cores to work makes perfect sense when you're powering a video game. But graphics processing units, or GPUs, can't serve much practical purpose in a corporate data center, can they?
The GPU vs. CPU discussion isn't as odd as it sounds. In fact, a more broad application of GPUs in the data center can provide the processing punch that CPUs simply cannot. With tasks where data can be processed in parallel rather than in sequence, GPUs might be a particularly valuable tool. The cover story in this issue of Modern Infrastructure looks at scenarios where simultaneous processing can be just what's needed, such as with machine learning and artificial intelligence.
This month's Modern Infrastructure also looks at how data can be protected while in the data center. Full encryption is seemingly a perfect defense for data theft. But that's a difficult -- and, to some, an unrealistic-- road to travel. We look at how an IT team can better safeguard its data, factoring in costs, the tools available and the tradeoffs involved in hack-proofing an organization's data.
And what about the vulnerabilities that arise from within your business? We examine the risk of data loss posed by the shadow IT phenomenon, an ongoing and ever-changing challenge.
It's clear that data is an increasingly valuable resource. Processing it and keeping it safe -- whether that entails taking up the question of GPU vs. CPU for certain workloads or upgrading encryption -- need to be priorities for IT professionals in organizations of all sizes and types.Continue Reading
Manage Data encryption
Learn to apply best practices and optimize your operations.
There is so much to keep in mind with Windows 10 security it's easy to overlook the essentials. Get back to basics and remember to keep an eye on updates, encryption and users. Continue Reading
Before wading into a data lake to help with protection, it's important to analyze what you're doing with your data and its backup and disaster recovery. Continue Reading
Enterprises are constantly bombarded by mobile security threats, and it's up to IT pros to thwart them. There are six key items that belong on IT's mobile security checklist. Continue Reading
Problem Solve Data encryption Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When it comes to encryption, the HIPAA implementation specifications are complicated. Expert Joseph Granneman explains whether it's required or addressable. Continue Reading
Unified communications security is venturing into unknown territory with the growing trend of embedding communications into business applications. New security challenges could emerge for IT as ... Continue Reading
With ransomware threats so prevalent, one way to start your organization's protection strategy is to make sure critical data backups are disconnected from primary storage. Continue Reading