Enterprise data News
December 05, 2016
Disaster recovery is about more than the duplication of enterprise data in an emergency, it's about getting the applications, servers and storage up and running quickly as well.
November 30, 2016
In today's threat-filled environment, money is not always a hacker's prime motivation. They could be driven by political reasons or just want to embarrass organizations. But irrespective of their ...
November 24, 2016
Freely available company information may seem a challenge to monetise. However companies like Dun & Bradstreet (D&B), Experian, Bureau van Dijk, Graydon, Equifax and Creditsafe have been ...
October 24, 2016
The rise of data breaches puts security as a top priority in businesses, and VDI is a layer that can help IT minimize the number of vulnerable endpoints.
Enterprise data Get Started
Bring yourself up to speed with our introductory content
Expert Ajay Kumar revisits the topic of data obfuscation techniques and explores the architectures, approaches and best practices for protecting enterprise data. Continue Reading
How IT teams store data in the cloud can affect performance, costs and security. Identify your needs to choose the right AWS storage service. Continue Reading
In this podcast, we dig into the nuances of chief data officer jobs. They bounce between defensive privacy, compliance efforts and offensive digital innovation undertakings. Continue Reading
Evaluate Enterprise data Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
More and more corporate data is being created and living on mobile devices such as tablets and smartphones. That dynamic requires a new approach to mobile data backup than protecting data stored on traditional servers.
Interest in endpoint and mobile device data protection has intensified as more companies allow workers to use personal computing devices at work.
Once considered an obscure novelty, smartphones and tablets have evolved into powerful tools with increasing storage capacity.
As employees, contractors, partners and other authorized users access and manipulate data wherever they are, IT administrators scramble to ensure that corporate data remains safe and secure. The need for faster restores, more frequent data protection, data growth and other challenges has fueled the search for alternatives to traditional backup technologies.
Mobile data backup technologies range from endpoint backup, file synchronization and sharing products and traditional on-premises backup with options for cloud-based replication.
Mobile devices present significant challenges to backup administrators. Personal tablets and smartphones aren't connected to the corporate network at all times, which means extra effort must be taken to back them up during intermittent periods of connectivity.
Backup storage processes that run against the device must be done in a way that doesn't interfere with the user's normal work activity. Lack of consistency across mobile devices is another challenge.
Organizations need to adopt mobile device usage policies and deploy technologies that enhance data security and mobile device management. Mobile data protection products are often used with tiered storage, in which inactive data is moved automatically to low-cost storage.Continue Reading
Data obfuscation techniques can help enterprises protect corporate information and limit risks of data exposure or leaks. Expert Ajay Kumar explains how these techniques work. Continue Reading
This buyer's guide provides insights to help you determine if your organization could benefit from data governance software and how to navigate the buying process. Continue Reading
Manage Enterprise data
Learn to apply best practices and optimize your operations.
Digitization has become a fact life for businesses, but the increased data volumes and associated information security risks puts a strain on digital governance, risk and compliance (GRC) resources. Businesses have struggled as unprecedented data volumes in the digital age have made them particularly enticing -- and vulnerable -- to hackers. The big data explosion has also made it difficult for companies to adapt information governance processes to stay compliant with constantly evolving regulatory mandates. All is not lost, however: Predictive analytics and automation tools are evolving to help with GRC maintenance, while companies are also seeing the benefits of integrating risk management processes across company departments. In this SearchCompliance handbook, get advice on how to adapt your company's GRC budgeting and strategic processes to keep up with the speed of digital business. Continue Reading
Your enterprise data protection family tree must incorporate both data availability and data management branches. Continue Reading
Whether you use disk, tape or cloud in your enterprise data protection, where you send your archives and backups is up to you. Continue Reading
Problem Solve Enterprise data Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Attackers use compromised credentials to infiltrate enterprises undetected and steal corporate data. Expert Nick Lewis offers the best ways to handle this threat. Continue Reading
Attackers may be looking to use steganography techniques to hide their malware. Expert Nick Lewis explains how they work and how to spot them. Continue Reading
As information has transformed into a huge business asset for modern companies, it has come at a price: Data is now a target for hackers seeking sensitive information about enterprises and their customers. This new online data security focus has forced businesses to invest in resources that protect trade secrets and other company information. At the same time, ensuring personal privacy has become a top concern for consumer advocates, and data security initiatives sometimes infringe on personal information protection measures. For companies to be successful in the digital age, GRC resources must walk the fine line between adequate cybersecurity and privacy protection for both employees and customers. In this handbook, learn the latest data governance strategies to help organizations strike this balance necessary to protect both corporate and personal information. Continue Reading