was successfully added to your cart.
Category

Encryption

image_pdfimage_print

Advanced Encryption and VTL Features Give Organizations New Impetus to Use the Dell DR Series as their “One Stop Shop” Backup Target

By | Backup Appliance, Data Protection, DCIG Sponsored Analysis, Deduplication, Disk Based Backup, Encryption, Legal Hold, Security | No Comments

The closer any new solution comes to being non-disruptively introduced into existing organizational backup infrastructures, the greater the odds that the solution will succeed and be adopted more broadly. By Dell including FIPS 140-2 compliant 256-bit AES encryption and VTL features as part of its 3.2 OS release for its existing and new DR series of backup appliances at no charge, organizations have new options to introduce the DR Series appliances without disrupting their existing backup processes.

Read More

2014 Mobile Data Management Buyer’s Guide Now Available

By | DCIG, Electronic Discovery, Encryption, Governance Risk and Compliance, Information Classification, Information Governance, Information Management, Key Management, Security, Threat Assessment | No Comments

DCIG is pleased to announce the release of its 2014 Mobile Data Management (MDM) Buyer’s Guide that weight, score and rank over 100 features. Like previous Buyer’s Guides, this Buyer’s Guide provides the critical information that organizations need when selecting Mobile Data Management software to help meet the security, compliance and Bring-Your-Own-Device (BYOD) challenges in an ever increasing mobile enterprises.

Read More

BYOD and MDM Drive Need for a New Buyer’s Guide

By | DCIG, Encryption, Security | No Comments

Information Technology Divisions (I.T.) traditionally does not deal with securing a device that has not been issued and controlled by them. Bring Your Own Device (BYOD) has exploded across industries. Rapid adoption of iPhone and Android devices displaced Blackberry Enterprise Server (BES) in the mobile enterprise email space. Adoption of new devices drives the need for Mobile Device Data Management software to assert control.

Read More

Cable Labeling, the Cloud, Encryption and Virtual Server Backup Topics Make It Into DCIG’s Top 10 for 2011

By | DCIG, Encryption, Key Management, Quantum Data Protection, Virtualization | One Comment

Today I continue to reveal the Top 10 most read blog entries on DCIG’s website in 2011 with these four (4) entries typifying the two extremes of topics that DCIG’s readers tend to read the most. At one end of the spectrum are two forward looking blog entries on topics that every organization are examining now: the cloud and virtual server backup. At the other end of the spectrum are two older blog entries on the topics of cable labeling and encryption for which organizations continue to need relevant information.

Read More

Trading in Tape Cartridges may save Money but First Weigh Security and Liability Risks

By | DCIG, Encryption, Governance Risk and Compliance, Tape Systems | No Comments

Disposing aging, depreciated or unneeded tape cartridges is an age old problem that companies resolve in one of three ways: they destroy them; they store them; or, they trade them in for hard cash or credits from resellers. This last option generates more than passing interest from companies since it offers them the opportunity to generate some revenue (or at least offset the cost of new tape cartridges). However the liabilities associated with the data on these recycled tape cartridges landing up in the wrong hands may outweigh whatever cost savings companies hope to achieve.

Read More

Riverbed Dedupes Data Domain; Managing Encrypted Data Archives for 100 Years: Final Insights from Fall SNW 2008

By | Archiving, Deduplication, Encryption, Security, Storage Systems, Uncategorized | No Comments

One of the more interesting conversations I had was with John Martin, VP of Product Management with Riverbed Technology. For those of you unfamiliar with Riverbed, its Steelhead® appliances provides WAN acceleration to improve application performance across corporate WANs. As part of the underlying secret sauce in these appliances, Riverbed uses compression and deduplication technologies (among others) to accelerate application performance. That information is fairly well known. What is not so well known is that it has seen instances where it has improved the data reduction rates by 30 – 70% of data that was already deduplicated, and it has specifically seen these results when testing with Data Domain’s appliances.

Read More

Think AES is Unbreakable? RSA Security’s Shamir Debunks that Notion

By | DCIG, Encryption, Governance Risk and Compliance, Key Management, Security, Threat Assessment | One Comment

The 2008 Crypto Conference provided a lot to talk about this year. If you didn’t know a Crypto Conference existed, you aren’t alone, but it is where the best and brightest mathematicians gather to discuss cryptographic and cryptoanalytic research. However at this conference Adi Shamir (the “S” in RSA Security that stands for Rivest, Shamir and Adleman and that is now owned by EMC) gave a presentation for a new attack on encryption systems called the “cube attack”. The ramifications of this attack sent a collective shockwave across the data security sector. Since encryption is revered as our best alternative and last safe harbor from data exposure, any weakness shown by encryption algorithms can have a dramatic ripple effect in data security.

Read More

Compellent Sees Green; Day 1 of Compellent’s C-Drive Annual User Conference

By | Archiving, DCIG, Deduplication, Encryption, Storage Systems | No Comments

Today and tomorrow I am putting on both my reporter and analyst hats. Living in Omaha, NE, I am only a hop, skip and jump away from Minneapolis, MN, so I took the opportunity to drive up here to attend Compellent’s annual C-Drive user conference that runs from May 6 – May 8 and do some live, on-site blogging about my experiences while I am here. Already a few notable items to report from last night’s customer reception and this morning’s opening presentation.

Read More

Encrypting data doesn’t mean it’s safe

By | Data Protection, DCIG, Encryption | No Comments

Encrypting data is the best mitigation plan you can provide data that is on hardware not in your control.  Risk matrices consist of  condition-consequence pairs, exposures, contingency and mitigation plans.  In the case of data stored on devices like tapes, removable hard drives and small portable storage cards, encryption is your best bet to keep the data from prying eyes.  Encryption is a simple process where a free-text key is used to safeguard the data in a scrambled fashion.  Unscrambling it allows it to be read. Read more here about safeguarding your encryption keys e49hi j043 0fqot9h3 (Leave a comment if you can decode it)

Read More