Originally posted by DataEndure Principal Engineer, Brian Herbeck, on linkedin.com As enterprise environments grow, complexity follows. Many IT departments struggle to adhere to standard processes, maintain documentation and manage change. And significant gaps or changes can lead to backup failures. Current NetBackup versions allow for significant customization and control surrounding virtual machine protection. This article covers the advantages and use cases for using both manual selection and VMware Intelligent Policy…. Read More
Your Unstructured Data is Holding You Back
You hear the term “unstructured data” often – data that is unorganized or doesn’t follow a structured data model. Gartner’s IT Glossary defines the term as “information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes.” Unstructured data is often blamed as the reason why traditional relational databases don’t meet the needs of Big Data. But that conversation doesn’t adequately describe… Read More
Case Study: DataEndure and Actifio Deliver Digital Resilience
This case study from Actifio on DataEndure is available in its entirety as a PDF here. Legacy Approaches Transformed with Modern Solutions DataEndure helps organizations protect, secure, access and capitalize on their data. However, they were seeing customers struggle with legacy systems and outdated strategies that no longer served business requirements. Customers needed a fresh approach that would take advantage of more advanced technology to accelerate, simplify, and reduce costs, especially… Read More
How Gemalto’s Tokenization System Protects Information
These days, some online payment processors, particularly mobile processors, rely upon tokenization to help improve security. For example, this technology empowers Apple Pay. Major credit card companies, like MasterCard, Amex, and Visa, are also now backing projects to help improve digital security with tokenization. Problems With Traditional Credit Card Payments Insecure payment processing schemes leave merchants, card holders, and card companies vulnerable. This kind of crime results in the loss… Read More
Who does CASB and Why Do We Need It?
A cloud access security broker, usually referred to as a CASB, offers a security gateway between your company’s IT infrastructure and that of a cloud provider. Companies use a CASB to extend their own IT governance policies and government regulations to third-party software and storage. If you have concerns about internal or external security threats, monitoring usage and behavior, or auditing historical data, you may need a CASB. To understand… Read More
IT Governance Risk and Compliance—Remove the Thorn in Your Side
In general, governance simply refers to the way that corporations follow business practices that conform to rules. Executives put these rules in place to help balance their own best interests with that of employees, customers, suppliers, governments, and other stakeholders. Naturally, some people may find certain rules inconvenient. However, in this age of mobile devices, remote workstations, elevated security threats, cloud storage, and increasing regulations, companies need excellent IT governance…. Read More
What You Need Out of Your Enterprise Backup & Recovery Solution
Like patients who may not visit the dentist until their teeth hurt, we hear from many IT executives who really didn’t prioritize data recovery plans until they suffered a loss and couldn’t get all of their data back. After a natural disaster or malicious hacking attempt, no new client ever comes to us and says that in the past they did too much to create and test out detailed recovery… Read More