Enterprise data News
December 05, 2016
Disaster recovery is about more than the duplication of enterprise data in an emergency, it's about getting the applications, servers and storage up and running quickly as well.
November 30, 2016
In today's threat-filled environment, money is not always a hacker's prime motivation. They could be driven by political reasons or just want to embarrass organizations. But irrespective of their ...
November 24, 2016
Freely available company information may seem a challenge to monetise. However companies like Dun & Bradstreet (D&B), Experian, Bureau van Dijk, Graydon, Equifax and Creditsafe have been ...
October 24, 2016
The rise of data breaches puts security as a top priority in businesses, and VDI is a layer that can help IT minimize the number of vulnerable endpoints.
Enterprise data Get Started
Bring yourself up to speed with our introductory content
Ensuring security in big data implementations remains a problem for most enterprises. Learn about the reasons why this is, and how your company can protect sensitive data. Continue Reading
A stakeholder is a person or group who has an interest -- vested or otherwise -- in an enterprise and whose support is required in order for an enterprise to be successful. Continue Reading
A business email compromise (BEC) is an exploit in which the attacker gains access to a corporate email account and spoofs the owner’s identity to defraud the company or its employees, customers or partners of money. Continue Reading
Evaluate Enterprise data Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The IoT edge lets developers move application logic to exactly where the data is located at any moment in time for performance, reliability and security. Continue Reading
More and more corporate data is being created and living on mobile devices such as tablets and smartphones. That dynamic requires a new approach to mobile data backup than protecting data stored on traditional servers.
Interest in endpoint and mobile device data protection has intensified as more companies allow workers to use personal computing devices at work.
Once considered an obscure novelty, smartphones and tablets have evolved into powerful tools with increasing storage capacity.
As employees, contractors, partners and other authorized users access and manipulate data wherever they are, IT administrators scramble to ensure that corporate data remains safe and secure. The need for faster restores, more frequent data protection, data growth and other challenges has fueled the search for alternatives to traditional backup technologies.
Mobile data backup technologies range from endpoint backup, file synchronization and sharing products and traditional on-premises backup with options for cloud-based replication.
Mobile devices present significant challenges to backup administrators. Personal tablets and smartphones aren't connected to the corporate network at all times, which means extra effort must be taken to back them up during intermittent periods of connectivity.
Backup storage processes that run against the device must be done in a way that doesn't interfere with the user's normal work activity. Lack of consistency across mobile devices is another challenge.
Organizations need to adopt mobile device usage policies and deploy technologies that enhance data security and mobile device management. Mobile data protection products are often used with tiered storage, in which inactive data is moved automatically to low-cost storage.Continue Reading
Data obfuscation techniques can help enterprises protect corporate information and limit risks of data exposure or leaks. Expert Ajay Kumar explains how these techniques work. Continue Reading
Manage Enterprise data
Learn to apply best practices and optimize your operations.
CIOs are increasingly being tasked with capitalizing on company information. Learn how to monetize data in this report from Outsell's DataMoney Conference. Continue Reading
The cloud generally makes sense for shorter-term data retention, but find out how it can also play a role in keeping data for longer periods of time. Continue Reading
Synchronous and asynchronous remote replication provide different options for IT. Understand the differences, and the potential effects on your network, to keep enterprise data safe. Continue Reading
Problem Solve Enterprise data Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
USB storage devices can be turned into covert channels with a software tool called USBee. Expert Nick Lewis explains how to protect your enterprise data from this attack. Continue Reading
Attackers use compromised credentials to infiltrate enterprises undetected and steal corporate data. Expert Nick Lewis offers the best ways to handle this threat. Continue Reading
Attackers may be looking to use steganography techniques to hide their malware. Expert Nick Lewis explains how they work and how to spot them. Continue Reading