Digital transformation is almost entirely about data. You need to generate and collect more data; use it more often; use it in more places; and use it faster. As a result, data security needs to […]
Cloud security continues to be one of the most important issues for companies that adopt this technology. The threats to data and applications in the cloud continue to evolve as technology changes […]
With the huge success of the cloud—some surveys show cloud being used by 96 percent of respondents—the risks to information have exploded. Cloud obliterates the perimeter where most traditional […]
Many of the biggest security threats on Amazon Web Services (AWS) come from misconfigurations. Default settings can leave resources publicly accessible and unprotected. These are the configuration […]
There are a number of challenges that need to be addressed when you use hybrid cloud. Moving data between the public and private sides of the cloud is one of the biggest. Relying on public […]
Security considerations still keep many businesses from moving their infrastructure to the cloud. Private cloud alleviates those concerns, but requires building your own on-site cloud so you lose […]
The top concern for organizations moving to the cloud – security. While many businesses turn to the cloud as a destination for their backups and to provide disaster recovery (DR) capability, using […]
As hybrid cloud growth continues to grow, companies need to increase their efforts to ensure security and compliance policies apply to data and applications in the cloud. While using hybrid cloud […]
dcVAST will host a webinar to discuss how United Airlines was able to reduce its patching deployments from months down to days and eliminate IT security risks.
The defining characteristic of hybrid cloud is the need for data to be transferred between public and private clouds on an ongoing basis. That means choosing the right data transfer methods and […]
No matter how effective a technology is, there comes a time when it no longer meets the business' needs and needs to be replaced by a newer, better technology. Is your backup strategy reaching its […]
There are many aspects to data security, but overall they boil down to knowing and controlling who has access to it. Firewalls and perimeter-based security try to keep intruders out, but intruders […]