DataSecurity1

5 Data security tips every IT manager should know

The past few months have been full of news coverage around data breaches and the need for data awareness. From hospitals to universities to children’s toys, data attacks are coming full force, and IT pros …

3 Questions answered by the Verizon Data Breach Report

Verizon’s annual Data Breach Investigations Report has become a hallmark of the security industry’s progress, as well as its preparedness against attackers and breach incidents. This year’s theme is, “Security should be a driving force, …

theproblem

Great product teams play bingo, not basketball

I totally admit that I drive product folks crazy. I am a huge believer that it is the responsibility of every person in a company to help ensure complexity and gratuitous innovation don’t creep into …

Leveraging VirusTotal for Security Context

Ever since we added file fingerprinting in version 2.2 of the DataGravity Discovery Series I’ve been thinking of ways to help our customers gain immediate security value from the generated file hashes. The first thought …

Predictable Storage Predictions

SearchStorage has recently published their storage predictions for 2016. The theme is “Enterprise storage market poised for change in 2016.” It is hard to argue with this since enterprise storage has been changing for the …

Why data-aware primary storage?

[We’re pleased to share the first in a series of guest posts from Enrico Signoretti, analyst and consultant at Juku. This post was previously published on juku.it ] The term data-aware storage is fairly new …

Is your unstructured data hiding insights, risks?

Our president and co-founder, John Joseph, recently caught up with a DataGravity customer who works in litigation support services, managing digital content for some big-name organizations. He heard how litigation support comes with significant challenges …

Andrew Hay to moderate a panel at the RSA Conference

Do you know many Internet of Things devices are currently connected to your company’s network? More importantly, do you know if any of those devices contain vulnerabilities that could leave your sensitive data exposed to …