data protection

Acronis Cyber Protect Cloud Integration with StorMagic SvSAN

StorMagic SvSAN keeps data always available and eliminates downtime. Acronis Cyber Protect Cloud keeps data protected and recoverable. Service providers can now offer a simple, flexible, reliable hyperconverged storage solution that requires only two servers for high availability along with class-leading backup and recovery. Easily expand your offerings with a High Availability + Data Protection solution from StorMagic and [...]

Infographic: StorMagic SvSAN with HPE GreenLake Backup and Recovery and HPE StoreOnce

StorMagic SvSAN is now validated with HPE GreenLake for Backup and Recovery, and HPE StoreOnce. This allows organizations to build solutions that deliver data protection and high availability at the edge and beyond, and overcome many of the common challenges with backup and recovery of data, especially in remote environments. Our infographic below shows the highlights of this joint HPE [...]

HPE Solutions with StorMagic: Data protection and HA at the edge and beyond

Digital transformation is underway across almost every industry, regardless of organization size. Some adopted early and are seeing the benefits, including the uses of new technologies and myriad of data and insights provided. Others are earlier in the process, with some implementations in place and others on the horizon. Much of the digital transformation starts at the edge, where [...]

The Future of Data Protection at the Edge

There are a plethora of ways in which organizations can protect their business-critical data at the edge. Whether that’s simply keeping the data highly available and active, or preventing it from being accessed or stolen – the options are numerous and all can be combined to give an organization the security and redundancy in their infrastructure to keep business operations [...]

Cybersecurity – A Beginner’s Guide

What is Cybersecurity? Cybersecurity is a term used to describe the practice of defending networks, devices, applications, and data from unauthorized access, hacking, malware, and other forms of cyber threats. It consists of a variety of different technologies, tools, processes, and approaches, for ensuring data confidentiality, integrity, and availability, also known as the CIA triad. They are just [...]

Encryption Key Management Best Practices for Advanced Data Protection

How is your data being protected from unauthorized access and use? Although encryption key management is incredibly important, many IT and security professionals are often unaware of best practices for managing encryption keys. If these best practices are not implemented, it can lead to an insecure system that increases the risk of encryption keys being compromised, opening the doors of [...]

High Availability’s Role in Protecting Data and Improving Performance

High availability (HA) is vital to protecting sensitive data, and an important part of key management. Key management is central to data encryption – encryption keys are like the keys to your house, and act to protect your valuables (the encrypted data). But, much like standard house keys, key management has a number of potential difficulties that can affect the [...]

An Introduction to Regulatory Compliance and Data Protection

With personal data becoming more important and bountiful in a digital and virtual world, the importance of regulatory compliance and data protection, storage, and management has also increased. Major regulations exist in several specific sectors, including, in the US, healthcare (HIPAA and HiTech), financial services (PCI-DSS and GLBA), biotechnology (FDA) and the energy industry, and IoT (NERC and FERC). Moreover, [...]

Global Trends in Data Security: Threats and the Rise of Encryption

Thales, one of the leading providers of data security solutions has recently released their annual Data Threat Report for 2018. This report analyzes data from 1,200 senior security managers from 11 countries around the globe, including the US, Germany, UK, the Netherlands, Japan, India, and Sweden and highlights among other trends, the rise of encryption. The report shows that spending [...]