Blog Archives

Is Encryption Overrated

When the subject of data security comes up, it often begins, and unfortunately, ends with encryption. Indeed, encrypting data is critical, but in most cases, if the hacker or malware program compromises a user or administrator account, then more than

Tagged with: , , , , , ,
Posted in Blog

Breach – Preparing Cyber-Secure Storage for the Inevitable

The goal of cyber-secure storage is to eliminate attempts to breach an organization’s storage and access its data. The prior three blogs describe methods IT can take to better protect the organization’s data assets; however, despite all the best efforts,

Tagged with: , , , , , , , ,
Posted in Blog

The Challenges of after-the fact Encryption

Encryption is a foundational component of a cyber-secure storage system. The problem is that most organizations implement encryption after-the-fact, months if not years after the initial implementation. When IT is considering a new storage system, they tend to focus on

Tagged with: , , , , , , , ,
Posted in Blog

Performance vs. Security vs. Management – How to Solve the Primary Storage Paradox

Applications and users demand unprecedented levels of performance, cyber-threats like ransomware require new levels of security and access control, and organizations are intolerant of any form of downtime or data loss. At the same time, they need to manage data

Tagged with: , , , , , , , , , ,
Posted in Article

Cyber-Secure Storage Requires More Than Encryption

Encryption is a fundamental element of building a secure storage system, but organizations need more than just encryption. Encryption works when the outside attacker can’t authenticate themselves, but if the outside attacker can compromise a user or admin account, then

Tagged with: , , , , , , ,
Posted in Blog

The Importance of Consolidation for Secure Storage

The Security Problems with Multi-Vendor Data Storage One of the most common data center trends is storage system sprawl. In today’s data center, every environment or workload has a unique storage architecture. While dispersed storage does allow IT to target

Tagged with: , , , , , , ,
Posted in Blog

SlideShare: Three Reasons Storage Security is Failing and How to Fix It

An organization’s data is constantly under attack. Whether it’s through ransomware attacks, cyber-threats or employee misguidedness, all expose organizational data and put it at risk. Encryption and access control are the keys to securing data and cyber resiliency, but most

Tagged with: , , , , , ,
Posted in Slideshare

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 21,893 other followers

Blog Stats
  • 1,255,913 views