Blog Posts Tagged with "Storage"
Transforming the Data Center
April 03, 2011 Added by:Rahul Neel Mani
IT is challenged today to re-energize the data center to readily accommodate changing business requirements and demands for always-accessible information. The challenge lies in making information both available and secure...
Comments (0)
Report: Data Centers Not Prepared for Disaster Recovery
March 31, 2011 Added by:Headlines
“When it comes to disaster recovery, the survey results are indicative of the investment activity we have seen in data centers throughout the recession—focus on immediate needs with business continuity and disaster recovery planning considered a luxury..."
Comments (0)
Moving Your Data to the Cloud – Sense and Sensibility
March 10, 2011 Added by:Danny Lieberman
Using a cloud service provider for storing sensitive data may actually reduce the threat surface instead of increasing it and give you more control by centralizing and standardizing data storage as part of your overall data governance strategy...
Comments (0)
SMBs, the Cloud and Disaster Recovery
March 09, 2011 Added by:Ben Kepes
Despite organizations identifying recovery time as a critical aspect of DR, and despite them estimating the cost of extended downtime at a very high rate, only 55% of respondents actually have any faith that their data will be completely restored within hours of an outage...
Comments (0)
Solid-State Disk Behavior Underlying Digital Forensics
March 06, 2011 Added by:Robert Gezelter
What was a previously a simple matter of running a recovery utility against a disk with corrupted structures may now involve multiple actors, all of which are operating with no mechanisms for synchronization. The possible risks may invalidate sound operating procedures, leading to data loss...
Comments (0)
Cloud Standards –The Great Debate
March 03, 2011 Added by:Ben Kepes
I’ve always been against cloud standards at so early a stage in the cloud lifecycle. It seems to me that we’re on this amazing wave of innovation with core technologies being reinvented on an almost daily basis. Any move to lock down standards will really impact on the velocity of that adoption...
Comments (0)
Google Plays Lost and Found With Gmail Accounts
March 02, 2011 Added by:Headlines
What is quite interesting about the event is the revelation from Google that the data for Gmail is backed up on tapes. Yes, Google, which maintains some of the largest network storage systems in the world, backs up data on relatively antiquated tapes...
Comments (0)
Database Security Discussion Lacking at RSA Conference
March 01, 2011 Added by:Alexander Rothacker
Why don’t organizations protect the database? It seems incredibly obvious, but it’s clearly not happening as often as it should be. Hopefully next year’s RSA Conference provides more education on database security – after all, that’s where sensitive information spends 99% of its lifecycle...
Comments (0)
Electronic Discovery and Digital Forensics: The Applications Front
February 28, 2011 Added by:Robert Gezelter
Attorneys and Information Technologists need to cooperate to identify relevant data and ensure that both the raw data and the technological context needed to understand data files is preserved to protect all interests, both actual parties and otherwise non-involved third parties...
Comments (0)
Gmail Data Vanishes Into the Cloud
February 28, 2011 Added by:Headlines
More than a few Gmail users logged into their accounts this weekend to find that all of their email, chats, photos, and documents were no longer available. Many of the affected users were simply greeted with the Gmail "welcome" message as if their accounts were newly created...
Comments (2)
How the Cloud Can Lock You In
February 05, 2011 Added by:Rahul Neel Mani
Organizations look at it as I have to protect my data either for importance or compliance reasons, maintain it and have it totally secure. Whether it be the aspect of authorization, authentication, or encryption of the data, information management security becomes a key component...
Comments (0)
Realizing the Potential of Virtualization
January 06, 2011 Added by:Stefan Fouant
In order for the vision of virtualization to realize it's true potential, the physical mold we have become accustomed to will have to be broken. Resources will need to be pooled together and this just isn't effective or scalable within the confines of traditional server chassis as we know it today...
Comments (0)
You, Your Data and Its Data Center
December 30, 2010 Added by:Christopher Burgess
When the IT pros show up at your desk asking you to identify, forecast or project your needs, work with them. They are attempting to get ahead of your requirements. You see, in the end, it all boils down to you, your data, and the data center supporting you...
Comments (0)
Virtualization Can Mean Less is More
December 10, 2010 Added by:Rahul Neel Mani
Modern networking and visualization technologies are an opportunity to implement the philosophy that 'less is better,' ensuring a closer-knit functioning of networks and data centers, says Greg Bunt, an Enterprise Architect at Juniper Networks, in an interview with Nipun Sahrawat...
Comments (0)
W3C Buries Web SQL Database Standard
December 03, 2010 Added by:Rafal Los
Although I keep saying that things are most secure when they're simple the new specification is orders of magnitude more complex - more documentation, moving parts, bits - than the Web SQL Database which had security as a principle. What could possibly go wrong, right?
Comments (0)
Road to Effective Information Management Part Two
November 20, 2010 Added by:Rahul Neel Mani
In the second part of his interview Manoj Chugh, President India and SAARC, EMC Corporation in a long, exclusive conversation with Rahul Neel Mani talks about how the company has reacted to customer demands, private clouds and EMC’s role in sustainability...
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider