Monday, August 5, 2013

Tech Resources: The latest and greatest from The Register

The Register
Tech Resources

6 August 2013

Hello, etechnews today.
Login to alter your email preferences Login

Check out our other feeds and services

Hello etechnews today Welcome to this Tech Resources update from The Register

The End User Security Jigsaw

Risk management is not about absolutes or certainty; it’s about playing the odds. This principle is particularly relevant when it comes to securing end user computing activity.

We have no shortage of solutions available to us in this area. Indeed looking at what’s available on the market, it’s clear that many options exist for tackling the same or similar requirements. The problem, however, is that none of them are 100% effective at what they are supposed to do. But even if they were, the complexity of the environment along with the dynamic nature of the problem means no single technology or service is ever going to be enough. Minimising your exposure is about mixing the right cocktail of solutions and approaches to achieve an ‘acceptable’ level of protection for your organisation and the situations that arise within it.

In an attempt to understand what this translates to in practice, we conducted an online research study during June and July 2013 in which data was gathered from 977 IT and business professionals. In terms of scope, the questionnaire used was one of the broadest we have ever developed at Freeform Dynamics, and our thanks go out to all of those who had the patience to work through it. The exercise was well worth it, however, as we ended up with a good holistic view of the things that really matter.

Before getting into solutions and approaches, however, it’s important to understand the problem. So let’s start out by looking at the nature of the end user security challenge.

Download Now

The Next Great Disruptor to the Data Protection Status Quo

Is backup really like car insurance?

Imagine being responsible for paying only a very small “insurance premium” for backup/recovery protection. In other words, imagine a process similar to the old methods but significantly cheaper, i.e., paying a marginal amount of money to cover the data being backed up. If you later experience an event that results in the need for recovery, then you pay an additional deductible matched to the level of calamity you experienced.

Why should we pay so much for all the capacity that we back up, when what we really want to focus on is how much we will need to recover?

Download your complimentary copy of the Enterprise Strategy Group white paper to get the Bigger Truth on the new Asigra Recovery License Model.

Download Now

Protecting Linux Systems from the Zombie Apocalypse

When severe weather, a natural disaster, or any other catastrophe occurs, your first thoughts will not be about recovering and restoring your company’s critical data, which is why you want to be prepared for the unexpected. “If you are generally well equipped to deal with a zombie apocalypse you will be prepared for a hurricane, pandemic, earthquake, or terrorist attack,” says Dr. Ali Khan, director of the Centers for Disease Control and Prevention. You probably are not worried about a zombie apocalypse, but if you are, the CDC offers suggestions for which items to include in your personal emergency kit. When it comes to preparing your business for catastrophe, your professional emergency kit should include a solid bare-metal restore and disaster recovery (DR) plan.

Download Now

Big Data Demands Big Changes to Legacy Backup

It is no surprise that backup related expenditures represent a major cost center for most data center environments. While denser disk and tape hardware architectures combined with technologies like compression and data deduplication have helped bring some reductions to the costs of backup hardware, there hasn’t been any corresponding relief in terms of how backup software is licensed.

Download this Storage Switzerland analyst report to learn more about how legacy backup software licensing schemes are placing an undue burden on data center environments trying to contend with the continuous onslaught of data growth and the new consumption based licensing models organization’s can switch to, to improve efficiencies, transparency and overall costs.

Download Now


Terms and Conditions

By downloading any of the papers, or by watching for any of the live or on-demand events above, you agree that your supplied personal details will be passed on to the sponsor of the paper/event, and that this organisation may contact you in the future with further information about their products and services. You can request a stop to such communications at any time.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.