1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Recent blog posts

Posted by on in Cloud
Data is the most important element in today’s agile, customer oriented business environment. And IT organizations are held responsible for access to that data, its stability and its security. “It’s the data that’s the important thing,” says Diana Kelley, principal analyst with SecurityCurve, a rese...
Hits: 533
0
Every minute of every day presents the opportunity for a data mishap. A security breach, as well as lost, stolen or even compromised records triggers negative exposure that quickly equates to forfeited sales, legal fees, disclosure expenses and a host of remediation costs. The fallout can result in ...
Hits: 561
0

Posted by on in Cloud
Compression technology was developed to address two computing problems: extremely limited network bandwidth and limited storage capacity. In today’s corporate environment, data compression technology still offers advantages in terms of network constraints and storage expense. However, data reductio...
Hits: 487
0
Can you outrun the bear?Because security is not Boolean, how do you know if you are secure? If regulation and compliance are not measures of whether you are secure or not, then how do you measure if your data is secure? Security is very gray, and very complicated. But, consider this simple story for...
Hits: 2143
0
There is a common myth that regulation and compliance, such as PCI and Basil II, benefits data security. In other words, thanks to these mandates data is more secure …where it otherwise would not be. In reality, it quite possibly could make some organizations much less secure. How could a regulation...
Hits: 895
0