Posted: Tuesday, February 23, 2021

The Evolution of Cyber Security Volume 1: The Emergence of XDR

The Evolution of Cyber Security Volume 1: The Emergence of XDR

“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it.” Tim Cook

In the game of cat and mouse between data security and bad actors, extended detection and response (XDR) is the latest weapon that organizations can utilize to strengthen their security posture.

XDR is a new approach to threat detection and response, a key element in defending an organization’s infrastructure and data from damage or unauthorized access and misuse. 

Read more »

Number of views (259)

Posted: Monday, August 27, 2018

Securing Your Data: Your Guide to Improving Your Data Protection

Securing Your Data: Your Guide to Improving Your Data Protection

By : Paul Oh

The talk of data protection, data breaches, and cyber security won't be going away anytime soon. As a rising threat all over the world, it's become more important than ever before to gain a deeper understanding of these trends and the short and long-term effects they could have on your business. 

Read more »

Number of views (16843)

Posted: Tuesday, September 29, 2015

Are the critical IT functions of your business disaster proof?

Are the critical IT functions of your business disaster proof?

Data loss and natural disasters have increased the importance of having a well planned and effective IT disaster strategy for your business. New capabilities provide companies of all sizes the potential for a less costly, faster and more flexible recovery solution for backing up data.

Read more »

Number of views (29447)

Posted: Friday, October 31, 2014

How to solve your biggest security issues with encryption.

How to solve your biggest security issues with encryption.


Securing sensitive data is one of the greatest challenges faced by many organizations of all sizes. Increasing regulatory demands and the constantly changing threat landscape have brought data security to the forefront of IT issues. Several of the more important data security threats are related to the protection of the storage environment, where drive loss and theft are primary risk factors.

Read more »

Number of views (17029)

CategoryID: