Written by Jaspreet on June 13, 2013
As printed in Healthcare Global magazine
The daily process of treating patients has been compared more than once to a military operation – and with good reason. After all, everything of real importance takes place on the front lines, at the point of patient contact. All else is purely support.
That analogy extends to the flow of data. Information has to make it to the front lines in order to be effective. Trouble is, that imperative also makes data—especially patient data—vulnerable to attack from … More »
Written by Sri on June 6, 2013
As today’s employees increasingly bring their devices into the office, and as the office becomes more mobile, the ways in which people work and handle data is drastically changing. Mobile workers are using a variety of tools to collaborate from the road, creating new challenges for the IT staff charged with protecting corporate data.
Data protection requirements have grown in accordance with new regulations across industries and throughout the world. Organizations must be able to demonstrate compliance, yet how can they … More »
Written by Jaspreet on May 30, 2013
As posted on Wired.com
The real-world SHODAN isn’t as malevolent as its fictional namesake. But in the wrong hands, it most definitely could be.
Although it has been around since 2009, SHODAN (taken from Sentient Hyper-Optimized Data Access Network, a form of artificial intelligence presented as a character in the video game System Shock) is currently being re-evaluated as one of the Internet’s biggest potential data security threats. That’s because SHODAN is a search engine designed not to locate websites and information … More »
Written by Carolyn on May 29, 2013
The volume of corporate data is exploding. Worldwide corporate data now doubles every 14 months and will reach 10.5 ZB by 2020. How and why is corporate data increasing so rapidly?
Written by Chandar on May 23, 2013
One of the ironies of IT managed software is that it allows IT to track detailed activities that an end user performs, but generally fails to automatically document actions performed by IT administrators themselves. If an IT admin makes an inadvertent policy configuration, accesses sensitive data, or changes access permissions, there is typically no default audit trail offering a quick-fix way to diagnose and undo the damage.
That was a lesson learned a few years ago when a network administrator for … More »
Written by Chandar on May 16, 2013
Migrating to new devices or operating systems has never been easy, especially for IT teams dealing with enterprise-wide technology refreshes, but these days it’s downright painful. The blame lies squarely with the rapidly changing technology landscape.
The average employee no longer has only one device but 2.8, nearly tripling IT time dedicated to device setup. The vulnerability of mobile devices to loss and theft has added to the load. One laptop is stolen every 53 seconds, 70 million smartphones are misplaced … More »
Written by Jaspreet on May 9, 2013
A perfect storm is brewing on the data security front, and it’s setting businesses up for a tidal wave of data breaches that may make today’s flood seem like a trickle.
A key contributor is the ongoing explosion in the world’s data stores. The volume of digital business information is now doubling every 14 months. There will be 10.5 zettabytes of data in corporate repositories around the world by 2020. That’s nearly 12 trillion gigabytes – enough to store 20 … More »
Written by Carolyn on May 1, 2013
It takes approximately 20.7 hours to restore a lost or damaged device. More devices are lost and stolen every year, and those are replaced with new models with different hardware and OS’s.
BMR is not a feasible solution in this fast-changing environment. Simplify restores and migration with an endpoint backup solution that backs up users’ data & personal settings.
Written by Sarah on April 22, 2013
eWeek.com recently published a slideshow based on the Druva white paper Top 10 Endpoint Backup Mistakes.
By Chris Preimesberger, as published on eWeek
Backing Up Only Desktops and Servers
According to recent studies, an impressive 28 percent of all corporate data is stored exclusively on laptops, smartphones and tablets. The modern workforce is increasingly mobile, so companies that rely solely on desktop backup put more than a quarter of their enterprise data at risk. Only about 35% percent of … More »
Written by Sarah on April 19, 2013
Druva CEO Jaspreet Singh spoke to ZDNet about the topics that keep him up at night.
By Gery Menegaz, as published on ZDNet.com
One of the most effective ways to ensure that I am able to anticipate the changes in an industry or market are, in large part, due to the work that I do as a technology writer. The preparation for the writing of an article allows me not only to see what is coming from a technology perspective but … More »