Blog Archives

SlideShare: How to Design a Compliant and GDPR Ready Collaboration System

Users need to collaborate on projects, which means sharing file data with other internal users as well as external business partners. More often than not, to accomplish this file sharing, they leverage cloud-based file-sync and share solutions. The problem is

Tagged with: , , , , , , , ,
Posted in Slideshare

Refining Your GDPR Strategy – Addressing User Data

The European Union’s General Data Protection Regulation (GDPR) deadline for implementation has come and gone. Many organizations have achieved a basic level of compliance, so now is the time to dig deeper, tie up loose ends and try to simplify

Tagged with: , , , , , , , , , , ,
Posted in Blog

Webinar: How to Design a Compliant and GDPR Ready Collaboration System

Users need to collaborate on projects, which means sharing file data with other internal users as well as external business partners. More often than not, to accomplish this file sharing, they leverage cloud-based file-sync and share solutions. The problem is

Tagged with: , , , , , , , ,
Posted in Webinar

SlideShare: Three Reasons Why Object Storage is the Best Defense against Ransomware Attacks

Backups, by themselves, are not an effective defense against a ransomware attack. The systems that store backup data also require protection, but backup storage is as vulnerable to a ransomware attack as production data, if not more so. If both

Tagged with: , , , , , , , ,
Posted in Slideshare

Managing Data to Manage Ransomware

One of the reasons that data centers are so vulnerable to ransomware attacks is the amount of data that remains accessible on production storage. The reality is that most of this data does not need to be there. Investing in

Tagged with: , , , , , , , ,
Posted in Blog

Webinar: Three Reasons Why Object Storage is the Best Defense against Ransomware Attacks

Backups, by themselves, are not an effective defense against a ransomware attack. The systems that store backup data also require protection, but backup storage is as vulnerable to a ransomware attack as production data, if not more so. If both

Tagged with: , , , , , , , ,
Posted in Webinar

SlideShare: Cloud Storage vs. On-Premises Storage

Enterprise IT managers know the pain of explosive growth in unstructured data. Managing that data requires an “all hands-on deck” strategy. It is imperative that IT tame this data beast by using every tool at its disposal, including the cloud.

Tagged with: , , , , , , ,
Posted in Slideshare

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,861 other followers

Blog Stats
  • 1,233,261 views