Search

Tag: data-protection

View:
Brandon Lee
  • Brandon Lee
  • January 15, 2025

Personal Data Encryption in Windows 11 24H2

Windows11 24H2 offers a fresh approach to protecting sensitive data with Personal Data Encryption (PDE). Discover the benefits of this new feature in our latest article.
Read more
Ivan Ischenko
  • Ivan Ischenko
  • October 24, 2024

Continuous Data Protection

Traditional backups can’t keep up with your business needs? Continuous Data Protection (CDP) offers near-zero data loss and fast recovery.
Read more
Diana Abo Harmouch
  • Diana Abo-Harmouch
  • January 11, 2024

What is the 3-2-1 Backup Rule? Why is it Important?

Every company faces the challenge of managing data, but have you considered the cost of losing it? Embrace the 3-2-1 Backup Rule – a foundation for robust data protection.
Read more
Romain Serre
  • Romain Serre
  • October 13, 2020

Microsoft Azure Backup Center Overview

Azure Backup Center was revealed during Microsoft Ignite 2020. It will be later released as a single-pane-of-glass management and monitoring tool for Azure Backup vaults. The solution will allow you to monitor and configure your backups, restore data, and set a certain level of compliance, all from a single GUI. Read the short guide by Romain Serre, a Microsoft MVP, about Azure Backup Center, its benefits, and how you can preview it today.
Read more
Michael Rakitin
  • Michael Rakitin
  • November 23, 2018

Complete an infrastructure project for your organization with iSCSI SAN

IT administrators are always confronted with the problem of building innovative, fast, modern, and reliable IT infrastructure that fits the budget and saves resources for future growth. To commence, you should plan, select, re-plan, clarify goals, and so on ad infinitum in a vicious circle. However, the issue of guaranteeing the data safety will always be relevant on the agenda. Choosing a SAN (Storage Area Network) with the iSCSI protocol as one of the possible storage solutions will ensure data security and constant availability. In addition, this approach is cost-effective in terms of maintenance and support.
Read more
Ivan Ischenko
  • Ivan Ischenko
  • January 4, 2018

Improve your Cluster Shared Volume security with Microsoft BitLocker

Nowadays, every company is doing its best to protect its data, which is pretty much its most valuable asset. As you know, data is vulnerable to unauthorized access and that’s when Microsoft BitLocker saves the day. BitLocker is the encryption technology from Microsoft, which makes possible to encrypt the Logical Volume on the transparent blade-based level (not physical disk). In this article, we will see how to encrypt Cluster Shared Volume (CSV) using Microsoft BitLocker to protect your data against unauthorized access.
Read more
Jon Toigo
  • Jon Toigo
  • May 11, 2017

Data Management Moves to the Fore. Part 4: Why Cognitive Data Management?

In previous installments of this blog, we have deconstructed the idea of cognitive data management (CDM) to identify its “moving parts” and to define what each part contributes to a holistic process for managing files and more structured content. First and foremost, CDM requires a Policy Management Framework that identifies classes of data and specifies their hosting, protection, preservation and privacy requirements of each data class over its useful life.  This component reflects the nature of data, whose access requirements and protection priorities tend to change over time.
Read more
Jon Toigo
  • Jon Toigo
  • April 4, 2017

Data Management Moves to the Fore. Part 2: Data Management Has Many Moving Parts

In the previous blog, we established that there is a growing need to focus on Capacity Utilization Efficiency in order to “bend the cost curve” in storage.  Just balancing data placement across repositories (Capacity Allocation Efficiency) is insufficient to cope with the impact of data growth and generally poor management.  Only by placing data on infrastructure in a deliberative manner that optimizes data access and storage services and costs, can IT pros possibly cope with the coming data deluge anticipated by industry analysts.
Read more
Andrea Mauro
  • Andrea Mauro
  • February 24, 2017

Design a ROBO infrastructure (Part 2): Design areas and technologies

In the previous post, we have explained and described business requirements and constraints in order to support design and implementation decisions suited for mission-critical applications, considering also how risk can affect design decisions.
Read more