The Untold Stories Behind Security

The apparatus of security is something that can be easily taken for granted. We may grumble about taking our shoes off at an airport security line, or having our bag searched on the way into a concert, but we largely accept these inconveniences as the price of security. The infrastructure that is necessary to make us all feel secure in order to conduct business, travel, and live our lives freely is vastly more complex than many of us typically think about. At the ASIS International 61st Annual Seminar and Exhibits last week in Anaheim the world’s experts in security management gathered to share insights on what it takes to mitigate risk and maintain security. These are the guys who think about security every day and never take it for granted. Experts presented on topics such as “The Future Effects of Rapidly Changing Security Technology” and “Living the New Normal of Sophisticated and Determined Attackers.” I listened to the head of security at The Mall of America describe behavior detection and assessment, and how they have responded when the mall was specifically mentioned in a terrorist threat video. He recounted some specific successes you probably haven’t heard about because security successes don’t make the news – security failures do.

Is DXi6900 the Silver Bullet for Your Growing Backup Pains?

Quantum's DXi6900 proudly received the Silver Award in Storage Magazine/SearchStorage.com's 2014 "Product of the Year Backup Hardware" category. This industry recognition comes just as industry analyst ESG released the results of their recent lab testing, validating DXi6900’s performance claims. Both the award and lab validation are a big deal for us and reinforce what we’ve already been hearing from our happy customers: DXi6900 is a high performance appliance that is very well suited to the needs of mid-size and enterprise-scale companies as well as managed service providers.

Choosing Which Secondary Data to Migrate to the Cloud – Part 1: Disaster Recovery

As I noted in an earlier blog, customers planning to move data applications (e.g., backup and archive) to the cloud must consider five key factors in selecting and migrating data. These are: Ongoing data transfer volume, expected frequency of ongoing data usage, data recall performance requirements, and application integration. In the next several blogs, I’d like to illustrate the importance of these factors by illustrating how they impact your design and planning as you migrate a few common data use cases to the cloud. The four use cases we’ll consider are: Site disaster recovery, data center off-site copy (for backup), compliance archive, remote site primary, archive and backup and ongoing management. Let’s start by looking at central site disaster recovery.

Worried About Data Vulnerability? You’re Not Alone

According to a recent survey of IT Managers by Quantum, one in four businesses have suffered a data security incident in the previous year. The survey also showed that 90 percent of IT Managers believe their organization’s data is vulnerable in the event of a disaster. Put these two statistics together and they paint an interesting picture (or infographic, to be exact). Based on the survey, you might conclude that IT Managers realize that data security threats are on the rise, and they are doing everything they can to protect their company’s data, resulting in only a 25 percent rate of incidents. On the other hand, the numbers don’t show how many incidents went unreported, and whether the organizations that avoided data security breaches are doing something right — or just got lucky.