Blog Archives

SlideShare: Ransomware – Five Reasons You’re Not As Protected As You Think

Ransomware is the number one threat to an organization’s data. These malware programs infiltrate an organization and encrypt every file they can access. The only way to unencrypt the data is pay a fee to the malware creator. Hence the

Tagged with: , , , ,
Posted in Slideshare

Backups and Users are Enabling Ransomware Success

Ransomware attacks against corporations is such a common problem that it has even made its way into television plots. Both seasons of the popular Mr. Robot television series on USA network focus on a series of ransomware attacks against a

Tagged with: , , , ,
Posted in Blog

Be afraid – very afraid – of Ransomware

If you’re not afraid of ransomware, you either haven’t thought about it or you thought about it enough to be very prepared for it. Ransomware is nothing but an electronic way of stealing money from you or your company, and

Tagged with: , , , ,
Posted in Blog

Webinar: Ransomware – Five Reasons You’re Not As Protected As You Think

Ransomware is the number one threat to an organization’s data. These malware programs infiltrate an organization and encrypt every file they can access. The only way to unencrypt the data is pay a fee to the malware creator. Hence the

Tagged with: , , , ,
Posted in Webinar

Podcast: Do you know what High-Value Data is?

High-Value Data is different from mission critical data. Mission critical data ensures the operation of the data center hour by hour. High-value data is critical data that organization has created but is not actively using but still needs to retain

Tagged with: , , , , , , , ,
Posted in Podcast

Securing High-Value Data in Mid-Tier IT

Despite its name, high-value data is often mishandled in many organizations. Often the backup process is counted on to secure and retain this information, but while some of the software has basic archive functionality it was neither intended nor designed

Tagged with: , , , , , , , ,
Posted in Article

Webinar: Triple Play Storage Security for High-Value Data

Optimization, compliance, and security come together in a single stack Today’s data-intensive organizations are struggling to confront the rising costs and risks resulting from global growth in information assets, difficulty in complying with new regulations, and the increasing threat of

Tagged with: , , , ,
Posted in Webinar

Briefing Note: Imation focuses on locking down High-Value Data

There is a new data type that IT professionals need to be concerned with: high-value data. This is unstructured (file) data typically created by users, that has organizationally sensitive information in it and needs to be protected from tampering, loss

Tagged with: , , , , , ,
Posted in Briefing Note

Hybrid Storage Needs SSD Cache Flexibility

While specialized all-flash storage systems grab the headlines, hybrid storage systems are increasingly becoming the workhorses of the data center, hosting the majority of applications, virtual machines and file shares. To expand the number of workloads that they can support

Tagged with: , , , , , , , ,
Posted in Article

What Is Object Storage?

This past week Storage Switzerland and other industry influencers joined Cleversafe, Data Direct Networks, Intel, Nexsan, Quantum, and Scality at the Next Generation Object Storage Summit in Florida. The first order of business was to try to explain what Object

Tagged with: , , , , , , ,
Posted in Blog