Data Protection

Data Protection is much more than verifying that you have a valid backup. While the recovery of your data is important, Data Protection also encompasses data life cycle management, business continuity, disaster recovery, and continuous data protection as they pertain to virtualized and cloud environments. This topic also examines how to secure and monitor the passing of data between disparate environments and how to increase the scale of data to be protected in shorter periods of time. (Read More)

How to manage the security and protection of your environment in order to safeguard your crown jewels has always been important. However, it has never been more so than today, when data-breach announcements are common and everyone from nation-states to teenagers in their bedrooms have access to powerful tools for breaking in.

VirtualizationSecurity

Symantec Expands Security Offerings

VirtualizationSecurity

Symantec has expanded its portfolio by acquiring identity protection firm LifeLock with a $2.3 billion dip into its pockets. Since Symantec divested itself of Veritas at a loss to the Carlyle Group in 2015, it has been looking to move into new markets. It acquired Blue Coat in August for $4.65 billion, a move that was seen to enhance its enterprise offerings.

Symantec plus LifeLock
Symantec acquires LifeLock to expand its Norton business

Read More

CloudComputing

Sorry Support: Not Getting My Data

CloudComputing

Recently, I made two interesting support requests, each to a different company. Both companies asked for the output of many different commands and log files. Both balked once I explained my organization’s security policy. The policy reads simply:

No anonymized data shall be delivered to a 3rd party.

It is a simple statement, but it has a powerful effect on all data being delivered to third parties, even for support. It implies that all user, machine, and service identifiers must be tokenized, encrypted, or outright removed. What must truly remain anonymous within our data? This is not simply a support question, but rather a major issue with all data today. Do we even know what is in our data? Do you?

Read More

VirtualizationBackup

We’ve Changed the guard at Buckingham Palace, it’s time for Hybrid – Vembu to the Rescue

VirtualizationBackup

In this, the eighth article in our series investigating the benefits of Vembu BDR for Virtualized Environments, we carry on examining Vembu’s migration capabilities. We all know that backing up your data is only one part of the equation. The ability to recover is the other, and arguably more important, side. This is where Vembu BDR really shines.

Again life is being kind to you, and once again you are sitting in your cube, monitoring your environment. OK, you know the score by now — playing Gorf! Well your wrong you’ve stated re-playing Donkey Kong after watching the movie Pixels at Steve’s Daughters birthday party. This is more fun as both you and Steve can now have a real points tally competition.  All is calm in the world and you are planning the next phases of the company cloud migration.

Logo_200x61
Time to go Hybrid

Read More

icon-datacenter-tech-new

Time to Go All In With the Cloud: Vembu to the Rescue

icon-datacenter-tech-new

In this, the seventh article in our series investigating the benefits of Vembu BDR for virtualized environments, we carry on examining Vembu’s migration capabilities. We all know that backing up your data is only one part of the equation. The ability to recover is the other, and arguably more important, side. This is where Vembu BDR really shines.

For once, life is being kind to you, and again you are sitting in your cube, monitoring your environment. OK, you know the score by now—playing Gorf. Steve’s score has improved, but because your environment is all calm and joy, yours is still better. All is calm in the world, and you are planning the next phases of the company cloud migration.

Logo_200x61
Time to go all in with the cloud: Vembu to the rescue

Read More

VirtualizationSecurity

Life During and After DDoS

VirtualizationSecurity

DDoS happens. It happens quite a bit. It will continue to happen. Information on how to prevent DDoS is readily available, but information on how to survive is missing. DDoS is an outage. Do you have a business continuity plan that covers this sort of outage? Does your business close for the day, or do you keep running in a reduced capacity? Or do you run at full capacity? Do you have multiple approaches to your business? Do you use a variety of services?

Read More