The 5 new features in Veeam Backup and Replication V8 you should care about

The 5 new features in Veeam Backup and Replication V8 you should care about

On May 20, 2014 Veeam introduced the latest version of their award-winning backup, replication and recovery software. In this post, we cover the 5 key improvements we think you should care about with the release of V8.

After all, we use it too.

[Read more...]

Avoid damaging data loss with full disk encryption [Symantec]

Today data is everywhere — whether you’re carrying it on a laptop in your briefcase or on a USB stick in your coat pocket. And it’s being accessed and used by employees, customers and partners, in the office and on the go.

At the same time, endpoints are more vulnerable than ever before, with a constantly changing threat landscape that extends beyond viruses. The number of ways we can store and share information means all the devices that make our lives easier also become critical points of failure for an organization.

With increasingly mobile workforces, it’s important for a security solution to protect data outside of the office. That solution should address a diversity of devices, from laptops to smartphones to tablets to USB sticks — as well as the various applications running on those devices.

Oftentimes, however, there’s a disconnect between what organizations need to protect against data loss and what they think they need to protect. [Read more...]

Strict laws are making email encryption a must-have [IBM]

LockYou only have to turn on the TV or read your favorite online news site to see how easily private or sensitive information can be captured, disseminated or used for purposes other than what was intended. While the WikiLeaks controversy may just be the latest dramatic case, it does remind us that email and other communications we treat as private are anything but and, in the wrong hands, that information can be used to commit identity theft or to do irreparable harm to businesses and institutions.

The reality is regular email communication on the internet is open for anyone who wants to go through the trouble of listening. Even if you’re securing data locally, your organization is vulnerable to a breach. After all, it only takes one user to forward emails with sensitive data to a business partner or innocently send them to his personal email account so he can work with the information at home.

[Read more...]