Orange Cubes

“I would recommend MegaCryption because it does what it says, handles our current needs and future needs that will arise, has more functions than other products, and the cost of the product was great. I would rate the technical support as a 10.”
- Major Northeast University

Large companies have not weaned themselves off their legacy mainframe systems because it is too difficult or expensive but because there are no superior alternatives. The computing power of the mainframe has let companies expand their operations to a global scale. For many organizations, the mainframe has been as much an agent of change as […]

Mainframes are able to work with and process data using many different operating systems, applications, and protocols. They are also able to save that data onto many different kinds of storage media. What follows is a brief overview of some of the most common types of mainframe storage media. Tape Storage One of the earliest […]

Enterprise systems can include mainframes and many other interconnected systems such as peripheral hardware, hundreds or thousands of virtual machines, native applications, Help Desks, BYOD users, and Cloud servers and storage. Here are some things to watch for while designing or reviewing your security system and policies. Mainframes must be able to maintain high availability […]

Distributed computing came with the promise of many opportunities for cost savings. Companies expected to save money when they move their applications from a centralized mainframe to a distributed environment or cloud solution. However, it’s not all sunshine and roses. Many hidden costs inflate the Total Cost of Ownership (TCO) of distributed computing. Businesses need […]

No one knows how the power of the mainframe will be used in the future. But with 90% of Fortune 500 companies still using it to power their mission critical operations, and it being responsible for nearly all credit card transactions, one thing is for certain: The mainframe has a long life ahead of it. […]

2014 is a big year for tech anniversaries. There was a big celebration for the 30th anniversary of the Mac, which changed personal computing forever and the way people felt about their computers. There was also the 10th anniversary of Facebook, which changed the way we connect with each other on the Internet. However, 20 […]

Although multi-factor authentication has been repeatedly proven to be a more secure way to protect user accounts from hackers, many common misconceptions still prevail about what counts as strong multi-factor authentication. Some account security measures that by themselves are weak multi-factor authentication, at best, include: 1. Using a pin code in addition to a password: […]

On this blog, we’ve discussed many of the important elements of data security, including encryption, access controls, multi-factor authentication, password management, and many others. However, no data security strategy is complete without physical control over the hardware. A comprehensive data security system requires physical control over the mainframe hardware and its connected components. Auditing a […]

Companies put encryption in place to protect their most valuable data. Properly implemented encryption adds a crucial layer of security to a database. In addition to strong access controls and multi-factor authentication, encryption can protect data from misuse, even if someone steals the hardware. In case of stolen hardware (which would be pretty challenging to […]

There are plenty of reasons for a business to make sure its data is secure. Not least of these is avoiding the embarrassment of landing in a conspicuous spot on one of the many “Top Ten Worst Data Breaches of 2013” lists. Some breaches come about through a mistake or negligence on the part of […]