data protection

HPE Solutions with StorMagic: Data protection and HA at the edge and beyond

Digital transformation is underway across almost every industry, regardless of organization size. Some adopted early and are seeing the benefits, including the uses of new technologies and myriad of data and insights provided. Others are earlier in the process, with some implementations in place and others on the horizon. Much of the digital transformation starts at the edge, where [...]

Your Complete How-to Guide to Disaster Recovery

In the realm of business continuity and disaster recovery, planning for the worst is the only way to bounce back quickly, with minimal damage. Most traditional disaster recovery plans often center around mitigating the impacts of large-scale events like natural disasters and man-made catastrophes. Planning for disasters like hurricanes, which can cause around $101.9 billion in damage, kill roughly 70 [...]

Acronis Cyber Protect Cloud Integration with StorMagic SvSAN

StorMagic SvSAN keeps data always available and eliminates downtime. Acronis Cyber Protect Cloud keeps data protected and recoverable. Service providers can now offer a simple, flexible, reliable hyperconverged storage solution that requires only two servers for high availability along with class-leading backup and recovery. Easily expand your offerings with a High Availability + Data Protection solution from StorMagic and [...]

Infographic: StorMagic SvSAN with HPE GreenLake Backup and Recovery and HPE StoreOnce

StorMagic SvSAN is now validated with HPE GreenLake for Backup and Recovery, and HPE StoreOnce. This allows organizations to build solutions that deliver data protection and high availability at the edge and beyond, and overcome many of the common challenges with backup and recovery of data, especially in remote environments. Our infographic below shows the highlights of this joint HPE [...]

The Future of Data Protection at the Edge

There are a plethora of ways in which organizations can protect their business-critical data at the edge. Whether that’s simply keeping the data highly available and active, or preventing it from being accessed or stolen – the options are numerous and all can be combined to give an organization the security and redundancy in their infrastructure to keep business operations [...]

The Future of Hardware vs Software RAID at the Edge

The need for RAID at the edge RAID (redundant array of independent disks) is just one critically important form of data protection and has been a key component in disk drive configurations since the 1980s. It enables users to easily distribute data from any application across multiple physical storage devices, so that if one device fails, the applications [...]

StorMagic SvSAN with Commvault Solution Brief

Edge Data Protection with StorMagic SvSAN, HPE, and Commvault Protect workloads on and off the edge with StorMagic SvSAN and Commvault Backup and Recovery. Challenges at the edge The enterprise IT landscape is going through a digital transformation, as it shifts from single-purpose data center designs to new technologies that deliver agility, scalability, and greater efficiency for protecting data [...]

StorMagic SvSAN with Zerto Solution Brief

Complete Edge-to-Edge Workload Protection Protect workloads on and off the edge with StorMagic SvSAN™ and the Zerto Platform. A world on edge The world of computing is moving to the edge. The Internet of things (IoT), machine learning (ML), and artificial intelligence (AI) has increased the need for computation on the edge. Low latency requirements bring compute resources closer [...]

Cybersecurity – A Beginner’s Guide

What is Cybersecurity? Cybersecurity is a term used to describe the practice of defending networks, devices, applications, and data from unauthorized access, hacking, malware, and other forms of cyber threats. It consists of a variety of different technologies, tools, processes, and approaches, for ensuring data confidentiality, integrity, and availability, also known as the CIA triad. They are just [...]

Encryption Key Management Best Practices for Advanced Data Protection

How is your data being protected from unauthorized access and use? Although encryption key management is incredibly important, many IT and security professionals are often unaware of best practices for managing encryption keys. If these best practices are not implemented, it can lead to an insecure system that increases the risk of encryption keys being compromised, opening the doors of [...]

Is There Still a Place for HSMs in Modern Data Protection?

Hardware Security Modules (HSMs) have been the standard for encryption for the last 20 years. But with the emergence of computing that spans on-prem, cloud and edge environments, there has been a shift away from physical, on-premises HSMs to software-based key management systems. With that said, are HSMs still relevant? Is an HSM best for an organization’s current data protection [...]

High Availability’s Role in Protecting Data and Improving Performance

High availability (HA) is vital to protecting sensitive data, and an important part of key management. Key management is central to data encryption – encryption keys are like the keys to your house, and act to protect your valuables (the encrypted data). But, much like standard house keys, key management has a number of potential difficulties that can affect the [...]

Ensure Strong Data Protection by Combining StorMagic SvKMS and Commvault Encrypted Backups

Data is the lifeblood of an organization. Whether it be customer data stored in a database, or a record of transactions that’s part of a larger order management system, data is what fuels the modern enterprise. As more and more companies store their data across the cloud, multiple clouds, and hybrid-systems, protecting that data has become critical. What happens when [...]

An Introduction to Regulatory Compliance and Data Protection

With personal data becoming more important and bountiful in a digital and virtual world, the importance of regulatory compliance and data protection, storage, and management has also increased. Major regulations exist in several specific sectors, including, in the US, healthcare (HIPAA and HiTech), financial services (PCI-DSS and GLBA), biotechnology (FDA) and the energy industry, and IoT (NERC and FERC). Moreover, [...]

Is Apple bringing GDPR to the US?

Not so long ago, Apple CEO, Tim Cook condemned the ‘weaponization’ of private data and called for the U.S. to adopt privacy laws similar to the EU’s GDPR. This would mean that any organization that trades with or sells to the US or any European country could face enormous fines if they mishandle or misuse data. Why is this worrying? [...]

Global Trends in Data Security: Threats and the Rise of Encryption

Thales, one of the leading providers of data security solutions has recently released their annual Data Threat Report for 2018. This report analyzes data from 1,200 senior security managers from 11 countries around the globe, including the US, Germany, UK, the Netherlands, Japan, India, and Sweden and highlights among other trends, the rise of encryption. The report shows that spending [...]