The Common Sense Backup Strategy
Published on May 13, 2014
It's not all hackers and thieves out there -- human errors, natural disasters, and hardware failure are all potential sources of data loss. Here are some things to think about when planning your company's data backup strategy. Data security is an issue that all organizations…
What to Do Before Encrypting Your Data
Published on May 5, 2014
Encryption is worth doing the right way. Here are some things to think about for your company's encryption strategy. It's common knowledge among security professionals today that one of the most important components of any data security strategy involves encryption. Encryption is an incredibly powerful…
7 Signs You Should Invest In Data Security
Published on April 30, 2014
Businesses run on data, and customers trust them or abandon them based on how well they take care of that data -- but many organizations are ill prepared to prevent or deal with a data breach. Robert Westervelt wrote for CRN that one of the…
Protecting the Mainframe from Internal Security Threats
Published on April 22, 2014
Sometimes the threats we face aren't in the Cloud -- they're in the office with us. Many of the security issues we have discussed in this blog have revolved around protecting an organization's data against external threats. Hackers and other cyber criminals pose a risk…
McAfee Names Advanced Software Products Group as Security Innovation Alliance Partner
Published on March 28, 2014
McAfee recognizes self-service password reset and synchronization as a key technology area -- and ASPG as a leading player in the field. The Security Innovation Alliance (SIA) is the premier technology partnership body in the security industry, formed under the aegis of McAfee. The primary…
The Hidden Costs of Moving from the Mainframe
Published on March 20, 2014
Distributed computing came with the promise of many opportunities for cost savings. Companies expected to save money when they move their applications from a centralized mainframe to a distributed environment or cloud solution. However, it's not all sunshine and roses. Many hidden costs inflate the…
Employees and BYOD Security
Published on March 14, 2014
If your organization has a BYOD (Bring Your Own Device) policy, there's a couple more things you'll need: Education for your employees and security on the software side. We've spoken before about some of the technological and policy issues of BYOD for enterprises running mainframes.…
Mainframes Make the Extraordinary Possible
Published on March 3, 2014
No one knows how the power of the mainframe will be used in the future. But with 90% of Fortune 500 companies still using it to power their mission critical operations, and it being responsible for nearly all credit card transactions, one thing is for…
What Will Matter in Access Management Software in 2014
Published on February 20, 2014
Mobile and cloud computing will continue to increase the importance of a secure access management system. This means access control will have to become an even larger part of any organization's data security strategy. Companies with deep technical talent may be tempted to develop and…
Are You Making One of These Database Encryption Mistakes?
Published on January 22, 2014
Companies put encryption in place to protect their most valuable data. Properly implemented encryption adds a crucial layer of security to a database. In addition to strong access controls and multi-factor authentication, encryption can protect data from misuse, even if someone steals the hardware. In…