Closing the Gaps in Your Data Security
Published on May 20, 2014
Enterprise systems can include mainframes and many other interconnected systems such as peripheral hardware, hundreds or thousands of virtual machines, native applications, Help Desks, BYOD users, and Cloud servers and storage. Here are some things to watch for while designing or reviewing your security system…
The Common Sense Backup Strategy
Published on May 13, 2014
It's not all hackers and thieves out there -- human errors, natural disasters, and hardware failure are all potential sources of data loss. Here are some things to think about when planning your company's data backup strategy. Data security is an issue that all organizations…
What to Do Before Encrypting Your Data
Published on May 5, 2014
Encryption is worth doing the right way. Here are some things to think about for your company's encryption strategy. It's common knowledge among security professionals today that one of the most important components of any data security strategy involves encryption. Encryption is an incredibly powerful…
Protecting the Mainframe from Internal Security Threats
Published on April 22, 2014
Sometimes the threats we face aren't in the Cloud -- they're in the office with us. Many of the security issues we have discussed in this blog have revolved around protecting an organization's data against external threats. Hackers and other cyber criminals pose a risk…
Are You Making One of These Database Encryption Mistakes?
Published on January 22, 2014
Companies put encryption in place to protect their most valuable data. Properly implemented encryption adds a crucial layer of security to a database. In addition to strong access controls and multi-factor authentication, encryption can protect data from misuse, even if someone steals the hardware. In…
Protecting Mission Critical Systems Through Data Encryption
Published on December 20, 2013
Of all the data security tools and techniques available, data encryption remains the most effective way to keep mission critical data secure and out of the wrong hands. Many large organizations today rely on mission critical technology. Mission critical can refer to any part of…
Who’s Already Using Encryption?
Published on December 17, 2013
If you're running a mainframe that stores and processes sensitive data, you already know about the importance of encryption to data security. However, even though data encryption is a proven way to keep data private, there are still many companies that are not using encryption…
From the Mainframe to the Cloud
Published on November 25, 2013
Part of the premise and promise of cloud computing is that organizations can deploy a system much more cheaply and manage it much more simply than if buying their own hardware and running their own data center. The conventional wisdom of cloud computing suggests building…
Big Data requires Big Security
Published on November 18, 2013
Every day, large organizations are flooded with the data generated in the course of doing business. Figuring out what to do with that data--how to leverage and benefit from it--as well as determining how to safeguard it are some of the hot topics emerging in…
Image Recognition – Multi-factor Security
Published on November 14, 2013
Do you recognize this image? As we've discussed before on this blog, multi-factor authentication is an essential part of a secure system. Passwords alone, even sufficiently complex ones, are useless if stolen. And other authentication methods like fingerprints are often not an ideal setup for…