When it comes to encryption, IT is constantly being told to “own the keys.” But why? Isn’t it OK if your provider owns the keys? Encryption keys are how you unlock encrypted data. Whoever or whatever owns the keys has…
The mobile ”work from anywhere” workforce creates new challenges for IT. Users not only need to sync and share data, they need to have data protected and need efficient storage in remote offices. IT can no longer let users establish…
Ransomware is a new type of threat. As a result it needs a new type of defense. The reason is simple: Backups are not enough to protect against ransomware. They are increasingly victims of the attack themselves, and they don’t…
When IT defenses are compromised, the organization faces one of two challenges. Either the data is encrypted by a ransomware attack or it is copied to the attacker’s servers. In the first case, assuming data protection is in place and…
Ransomware is one of the biggest threats facing IT. What exactly is ransomware? Ransomware is a program that once installed in a system encrypts an organization’s data and the only way to get it unencrypted is to pay a fee…
Enterprise file sync and share brings file synchronization and file sharing under IT control. Its competitor is public offerings that are outside of the oversight of the organization and puts corporate data at risk. For an enterprise file sync and…
One of the first announcements out of the chute at Dell EMC World 2017 is an updated version of Data Domain’s Virtual Edition (DD VE). The new version runs in both Amazon and Azure clouds and is designed to provide…
Disaster Recovery as a Service (DRaaS) solutions are inundating the market. Most vendors added the feature to their existing solutions as an afterthought by including the cloud – not integrating it. But DRaaS is maturing and customers are looking for…