Blog Archives

Why is Encryption Key Ownership So Important?

When it comes to encryption, IT is constantly being told to “own the keys.” But why? Isn’t it OK if your provider owns the keys? Encryption keys are how you unlock encrypted data. Whoever or whatever owns the keys has

Tagged with: , , , , ,
Posted in Blog

Enterprise File Sync and Share Panel Discussion

The mobile ”work from anywhere” workforce creates new challenges for IT. Users not only need to sync and share data, they need to have data protected and need efficient storage in remote offices. IT can no longer let users establish

Tagged with: , , , , , ,
Posted in Blog

Why Backups Can’t Protect Against Ransomware

Ransomware is a new type of threat. As a result it needs a new type of defense. The reason is simple: Backups are not enough to protect against ransomware. They are increasingly victims of the attack themselves, and they don’t

Tagged with: , , , , , , ,
Posted in Blog

ChalkTalk Video: WannaCry, Snowden, Wikileaks… Is Your Data Next?

When IT defenses are compromised, the organization faces one of two challenges. Either the data is encrypted by a ransomware attack or it is copied to the attacker’s servers. In the first case, assuming data protection is in place and

Tagged with: , , , , , , , , ,
Posted in Video

How Do You End Ransomware?

Here we go again. Friday, a ransomware attack hit the England’s National Health Care System. And according to sources they are paying! Once again we are rewarding bad behavior. The only way to end ransomware is to dry up its

Tagged with: , , , ,
Posted in Blog

What is Ransomware?

Ransomware is one of the biggest threats facing IT. What exactly is ransomware? Ransomware is a program that once installed in a system encrypts an organization’s data and the only way to get it unencrypted is to pay a fee

Tagged with: , , , , , , , ,
Posted in Blog

What is Enterprise File Sync and Share?

Enterprise file sync and share brings file synchronization and file sharing under IT control. Its competitor is public offerings that are outside of the oversight of the organization and puts corporate data at risk. For an enterprise file sync and

Tagged with: , , , , , , , ,
Posted in Blog

Dell EMC Delivers Data Domain Virtual Edition 3.1 for In-Cloud Data Protection

One of the first announcements out of the chute at Dell EMC World 2017 is an updated version of Data Domain’s Virtual Edition (DD VE). The new version runs in both Amazon and Azure clouds and is designed to provide

Tagged with: , , , , , , ,
Posted in Blog

SlideShare: How To Achieve Total File Security in the Cloud

Today’s IT professional is stuck in the middle of a file sharing tug of war. One side has the end users who want the improved productivity that mobility and collaboration promises. The other side consists of corporate governance that wants

Tagged with: , , , , ,
Posted in Slideshare

What Does The Next Generation of DRaaS Look Like?

Disaster Recovery as a Service (DRaaS) solutions are inundating the market. Most vendors added the feature to their existing solutions as an afterthought by including the cloud – not integrating it. But DRaaS is maturing and customers are looking for

Tagged with: , , , , , , , ,
Posted in Blog