Blog Archives

Archive is Better than Backup

For decades data center best practices were to isolate backup and archive. “Backup is not archive” was the mantra. The reality is most data centers ignored the mantra and used their backup process for all of their data retention. Today,

Tagged with: , , , , , ,
Posted in Blog

How Aparavi Delivers GDPR Compliant Data Management, Privacy, and Protection

Data Privacy regulations like GDPR require that data be protected and managed differently than it has been in the past. Organizations need to prove they are protecting data, securing it, retaining it, and they need to, if a user requests

Tagged with: , , , , , ,
Posted in Blog

Creating a Data Privacy Protection Architecture

The General Data Protection Regulation (GDPR) forces organizations to evolve from a data protection mindset to a data management mindset. IT can no longer let backups store data on secondary storage as giant blobs of ones and zeros. The process

Tagged with: , , , , , ,
Posted in Blog

Solving the Right to Be Forgotten Problem

An aspect of the European Union’s (EU) General Data Protection Regulation (GDPR) and similar regulations like California’s Consumer Privacy Act, is the “right to be forgotten.” Simply stated this means that a user or customer of an organization’s resources has

Tagged with: , , , , , ,
Posted in Blog

GDPR is for Everyone – Why All Businesses Need A Data Privacy Policy

Many IT Planners look at the European Union’s (EU) General Data Protection Regulation (GDPR) as a distinctly European problem. The reality is the GDPR and regulations like it, impact businesses around the world. GDPR impacts any business that does business

Tagged with: , , , , , , , ,
Posted in Blog

Webinar: Data Management vs. GDPR and Data Privacy – How to Solve the Right to Be Forgotten Problem

The General Data Protection Regulation (GDPR) makes specific demands on organizations based in and doing business in the European Union (EU). Now several US states are considering similar legislation and California has already passed a GDPR-like law. Clearly this is

Tagged with: , , , , , ,
Posted in Webinar

Breach – Preparing Cyber-Secure Storage for the Inevitable

The goal of cyber-secure storage is to eliminate attempts to breach an organization’s storage and access its data. The prior three blogs describe methods IT can take to better protect the organization’s data assets; however, despite all the best efforts,

Tagged with: , , , , , , , ,
Posted in Blog