
Disaster Recovery (DR) is changing, and DR plans need to change with it. Legislative bodies want companies to not only prove their ability to recover from a disaster, but they have specific guidelines as to how long that effort can…
Disaster Recovery (DR) is changing, and DR plans need to change with it. Legislative bodies want companies to not only prove their ability to recover from a disaster, but they have specific guidelines as to how long that effort can…
The target of most cyber-attacks, like ransomware, is eventually the primary storage system that stores the organization’s most valuable data. If an attacker compromises the organization’s data, they either attempt to restore the data from backups or pay a ransom…
Security breaches are a constant threat to organizations, and while securing primary storage is a top priority another challenge is making sure data is secure as various processes copy it. Organizations copy data for many legitimate reasons; backup, test-dev, and…
Managing one of something is usually easier than managing five of something. Indeed, when it comes to storage systems, it is easy to manage one vast storage array than it is five to ten individual ones. Consolidated systems focus much…
When the subject of data security comes up, it often begins, and unfortunately, ends with encryption. Indeed, encrypting data is critical, but in most cases, if the hacker or malware program compromises a user or administrator account, then more than…
The goal of cyber-secure storage is to eliminate attempts to breach an organization’s storage and access its data. The prior three blogs describe methods IT can take to better protect the organization’s data assets; however, despite all the best efforts,…
Encryption is a foundational component of a cyber-secure storage system. The problem is that most organizations implement encryption after-the-fact, months if not years after the initial implementation. When IT is considering a new storage system, they tend to focus on…
Applications and users demand unprecedented levels of performance, cyber-threats like ransomware require new levels of security and access control, and organizations are intolerant of any form of downtime or data loss. At the same time, they need to manage data…
Encryption is a fundamental element of building a secure storage system, but organizations need more than just encryption. Encryption works when the outside attacker can’t authenticate themselves, but if the outside attacker can compromise a user or admin account, then…
The Security Problems with Multi-Vendor Data Storage One of the most common data center trends is storage system sprawl. In today’s data center, every environment or workload has a unique storage architecture. While dispersed storage does allow IT to target…