Outsourcing

Data security & protection News

View All News

Data security & protection Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data security & protection Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Why a tape backup system is still a good storage option

    Tape backup technology has not only stuck around in the storage industry, but has thrived as data has grown. See how tape tackles the competition in this essential guide. Continue Reading

  • Direct backup changes rules, cost of backup

    Flat backup, also known as direct backup, is a backup approach based on storage snapshots, and it's gaining popularity.

    It allows users to copy data directly from primary storage to secondary storage without the use of a backup server and software.

    Its major benefits are simplicity and low cost. However, the approach requires specific technologies and can't protect every resource in an organization.

    Direct backup is not entirely new, either. Some vendors have supported it for years. And a number of additional vendors have gotten behind this technology recently. It has become a more viable option in recent years because of improvements in snapshots.

    These products rely on redirect-on-write snapshots, which have a lower impact on performance and allow snapshots to be taken more frequently. In all cases, the systems are proprietary, and in most cases are only possible using specific systems. Because of these limitations, flat backup will not be the right approach for many organizations. But in some cases, it can be very useful.

    Our Drill Down on flat backup will look at the technology in detail, explain how it works and the hardware that supports it, and discuss possible uses. It will also provide examples of when direct backup is not appropriate to help you decide whether the technology will be effective in your environment.

     Continue Reading

  • Picking the best CASB for your enterprise

    Cloud access security brokers, or CASBs, are either in-house network gateways or security-as-a-service cloud offerings that inspect network traffic destined for the cloud. This guide equips security pros with the knowledge they need to buy the best CASB platform or service for their company's needs, technological requirements and budget.

    CASBs work by examining a network's traffic and determining if sensitive data is being sent to the cloud. CASB technology then applies policies and other security controls to ensure that sensitive data is safe.

    This Buyer's Guide on CASB offers an overview of the emerging technology, explains how it works and highlights key features. It includes detailed explanations of the features a CASB should have, but it also has guidelines on some nice-to-have features. Readers will come away with a complete overview of the currently available technology. In short, they will be equipped to launch their IT evaluation process and select the best CASB for their companies.

     Continue Reading

View All Evaluate

Manage Data security & protection

Learn to apply best practices and optimize your operations.

  • To defend endpoint security in healthcare, technology teams with training

    At many hospitals and physician practices, endpoint devices -- such as desktop computers, laptops and smartphones -- can become areas for cybercriminals to exploit. However, a combination of high-tech defense and old-fashioned common sense offer potent protection against endpoint breaches.

    This handbook starts off with an article that looks at the security aspects of patient data on mobile devices and how those devices can work with storage technology. It may be best, when possible, to steer clear of storing personal health information on smartphones and tablets. Instead, look to back-end storage options.

    Next, readers can learn about HIPAA breaches and endpoint security in a Q&A with a hospital interim CIO. He recommends using multifactor authentication -- in other words, the practices of using at least two different credentials to verify a user's identity -- as a prime way to protect patient data from breaches that could violate HIPAA requirements.

    The final article pinpoints the security advantages offered by a virtual desktop infrastructure (VDI), which can help medical facilities sidestep data breaches while physicians use mobile devices.

    These high-tech efforts, combined with improved end-user education, can help clinicians and others in hospitals and physician practices avoid lurking digital dangers that threaten endpoints.

     Continue Reading

  • What's the best way to organize the CISO reporting structure?

    The importance of the CISO reporting structure continues to grow as the importance of the CISO grows. Expert Mike O. Villegas discusses who the CISO should report to. Continue Reading

  • Rethink the use of an object storage gateway for data migration

    Software options that allow data to be written natively to object storage may be better for your organization than gateways that migrate data to object stores. Continue Reading

View All Manage

Problem Solve Data security & protection Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close