Situation On January 3, 2018, researchers, including those with Google Project Zero, released information on three new vulnerabilities: CVE-2017-5753: bounds check bypass CVE-2017-5715: branch target injection CVE-2017-5754: rogue data cache load They grouped these vulnerabilities under the names “Spectre” (CVE-2017-5753 and CVE-2017-5715) and “Meltdown” (CVE-2017-5754). Comprehensive details on both of these are available at https://meltdownattack.com. Security updates to address these vulnerabilities began releasing before disclosure on January 3, 2018. Security updates are continuing… Read More
Why do US-based companies care about GDPR?
Why Do Americans care about foreign complianace standards? Data Protection standards aren’t anything new. The General Data Protection Regulation (GDPR) we’re seeing in the news is a facelift of an existing regulatory directive (95/46EC) that’s been active in the EU since 1995. The reason it’s demanding so much attention now is that while this directive focuses on the EU, it isn’t based or enforced geographically but on the users themselves…. Read More
How to Avoid the 36-Month ‘Tech Refresh’
Purchasing a new enterprise storage system is usually the largest data center equipment purchase for most companies. The cost is justified because these systems store and protect the companies most critical data and applications. In fact, the purchase often includes multiple systems so it can provide quick recovery at another location in case of a natural disaster or power outage. So how do these storage vendors reward their customers for… Read More
How Gemalto’s Tokenization System Protects Information
These days, some online payment processors, particularly mobile processors, rely upon tokenization to help improve security. For example, this technology empowers Apple Pay. Major credit card companies, like MasterCard, Amex, and Visa, are also now backing projects to help improve digital security with tokenization. Problems With Traditional Credit Card Payments Insecure payment processing schemes leave merchants, card holders, and card companies vulnerable. This kind of crime results in the loss… Read More
Who does CASB and Why Do We Need It?
A cloud access security broker, usually referred to as a CASB, offers a security gateway between your company’s IT infrastructure and that of a cloud provider. Companies use a CASB to extend their own IT governance policies and government regulations to third-party software and storage. If you have concerns about internal or external security threats, monitoring usage and behavior, or auditing historical data, you may need a CASB. To understand… Read More
IT Governance Risk and Compliance—Remove the Thorn in Your Side
In general, governance simply refers to the way that corporations follow business practices that conform to rules. Executives put these rules in place to help balance their own best interests with that of employees, customers, suppliers, governments, and other stakeholders. Naturally, some people may find certain rules inconvenient. However, in this age of mobile devices, remote workstations, elevated security threats, cloud storage, and increasing regulations, companies need excellent IT governance…. Read More
How to Consolidate and Store Your Aging Tape Inventory
Can you name the oldest kind of storage medium that’s still commonly in use today? According to Storage Newsletter, it’s magnetic tape, a vintage technology that was invented in the 1920s to record sound. One of the reasons that so many companies still store data on tape is simply because it’s cheap and reliable. Kept under the right conditions, magnetic tapes can last for decades. Some companies still have thousands of… Read More
How to Approach Storage Optimization for Space- and Cost-Efficiency
In our experience, many companies have relied upon a one-size-fits-all approach to data storage. Sooner or later, that approach grows inefficient, expensive, and in some cases, unworkable. This is particularly true if a company has not reanalyzed their storage needs for some time. Many of our new clients have concerns about performance, security, and costs. When we analyze and categorize our client’s data, questions about efficient, secure, and affordable data… Read More
How and Why You Should Determine Your RTO and RPO
Conversations between a DataEndure SME backup engineer and customer can go like this: I need to revamp my company’s backup-and-restore solution. The script I’ve been tweaking all along is getting too complicated and error-prone. But while I’m ripping and replacing, where can I get some of that virtual recovery stuff I’ve been hearing about? We’d be happy to show you, but first let’s map out your current situation. Which of your applications… Read More
How it Looks to Use NetBackup For Your Next Virtual Migration
NetBackup is an enterprise-level backup and recovery solution developed by Veritas. It supports a variety of platforms, including many versions of AIX, HP-UX, Linux, Tru64, Solaris, Windows, and Unix. NetBackup uses a central master server to manage both clients and servers that contain the backup media. The current version of NetBackup is 7.0, which uses NetBackup OpsCenter to manage multiple NetBackup environments. OpsCenter replaces NetBackup Operations Manager (NOM), which was… Read More