Thursday, May 18, 2017

Don't cry, implement proper data protection

Data Protection Digest

A roundup of data protection content from TechTarget's network |May 18, 2017

TechTarget
FEATURED STORY
WannaCry puts ransomware, data protection in headlines
Sonia Lelii

To survive events such as the WannaCry ransomware attack without serious damage, experts recommend strong data backup and monitoring. Up-to-date patching also helps. (SearchDataBackup)

Advertisement
NEWS
 
Druva opening three more cloud locations around world

New Druva cloud data centers in Canada, the United Kingdom and Hong Kong seek to help customers align with regional data protection regulations. (SearchDataBackup)

 
Dell EMC launches integrated backup appliance

Launched last week at Dell EMC World, the Dell EMC IDPA packages EMC backup and data deduplication software with Dell server hardware. (SearchDataBackup)

 
Veeam announces CEO changes ahead of conference

The Veeam CEO office now includes two executives: Peter McKay and Andrei Baronov. The co-CEOs want to help Veeam try to become a billion-dollar company. (Storage Soup)

 
Code42 tracks endpoint data movement for security

Code42 endpoint data protection software tracks and monitors data movement, so administrators can stop data loss and leakage before it becomes a threat. (SearchDataBackup)

EXPERT ADVICE
 
What are the top challenges for backup admins?
As a backup administrator, you'll find yourself facing a number of cybersecurity challenges, and they're not limited to ransomware. (SearchDataBackup)
 
HPE Data Protector takes aim at large businesses
Part of the HPE backup software suite, Data Protector protects application data across a number of environments and operating systems. (SearchDataBackup)
 
Seven common errors in business continuity planning

A business continuity strategy is prone to mistakes, from lack of management support to failure to review and update plans. (SearchDisasterRecovery)

 
Ransomware protection aided by malware detection

A valuable method of protection against ransomware is the use of canary files to identify the exact moment an infection occurs. (SearchDisasterRecovery)

About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Data Protection Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Storage Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2016 TechTarget. All rights reserved.
TechTarget

No comments: