Enterprise Features

Select

  • Home
  • Reviews
  • Articles
Home / Posts tagged Security
Secure Passwords: A Cautionary Tale

Secure Passwords: A Cautionary Tale

I am hesitant to bring up the Ashley Madison mess, but someone has to – site security was even worse than we thought. The Impact Team hackers hacked into the …

September 24, 2015 | Full Article Archive
Companies: Say No to Consumer-Level File Sharing (Part 2)

Companies: Say No to Consumer-Level File Sharing (Part 2)

In “Just Say No” Part 1 we talked about Dropbox and why it’s not ready for prime time in the enterprise. In Part 2 we’ll talk about what file share …

September 2, 2015 | Full Article Archive
Companies: Just Say No to Consumer-Level File Sharing

Companies: Just Say No to Consumer-Level File Sharing

Dropbox is a big consumer-based file sharing service, famous among users for its simplicity — and infamous among IT professionals for being unmanageable. …

August 26, 2015 | Full Article Archive
HIPAA-Compliant Backup: Secondary Data Protection

HIPAA-Compliant Backup: Secondary Data Protection

Sensing a big opportunity, a number of technology companies added HIPAA-compliant software and services. But how compliant are these vendors? HIPAA stands for …

August 12, 2015 | Featured, Full Article Archive
How Secure Are Private Clouds?

How Secure Are Private Clouds?

The private cloud, also known as the internal cloud or corporate cloud, is a proprietary computing architecture that is hosted internally or externally and is …

June 2, 2015 | Full Article Archive
Two-Factor Authentication: What is it and Why is it Needed?

Two-Factor Authentication: What is it and Why is it Needed?

A Verizon Report in 2012 identified password theft as one of the major causes of data security breaches in the past year. The situation has not changed much …

May 20, 2015 | Full Article Archive
Common Threats to Cloud Computing Security

Common Threats to Cloud Computing Security

Cloud computing is a type of computing in which groups of remote servers are linked to allow centralized storage of data and online access to information …

March 13, 2015 | Full Article Archive
Unstructured Data is a Waste of Resources… and Potentially Dangerous

Unstructured Data is a Waste of Resources… and Potentially Dangerous

What is Unstructured Data? According to Wikipedia, “Unstructured Data refers to information that either does not have a pre-defined data model or is not …

October 17, 2014 | Full Article Archive
CloudAlloy Breaks Files and Docs in to Many Pieces and Stores them Encrypted in the Cloud

CloudAlloy Breaks Files and Docs in to Many Pieces and Stores them Encrypted in the Cloud

CloudAlloy has come up with an innovative solution to help improve security issues in the cloud. It has become apparent that Cloud security is a number one …

September 15, 2014 | Full Article Archive, Interviews
The 5 Most Important Steps to Ensuring Data Security in the Cloud

The 5 Most Important Steps to Ensuring Data Security in the Cloud

The use of cloud computing services makes a lot of sense for many businesses. By storing data on remote servers, businesses can access data whenever and …

June 10, 2013 | Full Article Archive
4 Enterprise IT Security Tips for 2013 and Beyond

4 Enterprise IT Security Tips for 2013 and Beyond

Each new year brings new IT challenges. Some challenges arise from technological innovation. Others come from an organization’s growth, evolving compliance …

December 7, 2012 | Full Article Archive, Guest Post

How to Keep Your Cloud-Stored Files Secure

Technology has come a long way. What used to be stored in warehouse-sized rooms now fits on a pocket-able thumb drive. With the advent of the Cloud, storage …

August 25, 2012 | Full Article Archive

Underground Hackers Have Trouble Reaching The Cloud

In the tech industry, there is constant debate about the safety and security of SaaS. This is a long and complicated debate that would require more than just …

July 5, 2010 | Full Article Archive
Follow Us:

Tags

Acquisition active archive always-on business Arun Taneja Backup backup target Bare Metal Restore Cloud Cloud backup cloud computing cyber security Dark Data Data Data Breach Datacenter data loss Data Protection Deduplication differential backup Disaster Recovery DRaaS emc dell EMC Dell merger Encryption Erasure Coding Excel protect File Sharing full backup HIPAA Hyperconvergence incremental backup MSP NetApp profit SaaS Security Servers SolidFire Storage Tape VHD Virtualization VMware WAN Windows
© 2017 Enterprise Features. All rights reserved.
Best enterprise cloud backup solution reviews