Preston and I had a good discussion with Commvault‘s Senior Director of Product Management, Don Foster. When most people, and possibly you, think of Commvault, you think backup and restore. But Commvault is much more than simple backup and restore activities; it covers the entire gamut of data protection for your business. Commvault is a common word for IT old-timers and newcomers alike since it’s been around for 30 years.
In this podcast, we cover data protection as it relates to backup, restore, business continuity, recovery, and more. Data protection is a company’s consistent defense against theft, data exfiltration, data loss, insider threats, ransomware, and disasters. Disaster recovery is another huge chunk of what Commvault does. We touch on every aspect of enterprise data protection in this podcast.
You have to remember that not all security topics deal with passwords, encryption, and policies–some of it has to do with the actual mechanics of protecting your data. Think disaster recovery.
Think about what Commvault offers you. We’ve all had backups and restores fail on us–even after multiple checks. What Commvault offers is the assurance that your data doesn’t have to be restored to its original backup point to be readable and usable, when the worst happens. Don explains this service further in the podcast. We also cover mobile data protection in the podcast. This one is a few minutes longer than our average podcast but I think you’ll agree that your time will be well spent by listening to it.
Length: 27:45 minutes. Format: MP3. Rating: G. License: CC BY.
As promised on our 2017 Topics List, January is for cybersecurity resolutions. This podcast features Preston and me discussing a short list of cybersecurity awareness topics for personal and for business use. Staying secure in everything you do is very important. We can’t stress too much the importance of using very strong passwords, doing some regular housekeeping, being smart about opening email attachments, and protecting yourself from cyberstalkers who want to compromise your accounts and your identities.
We decided to try something different today and record our podcast at a little cafe that’s inside our favorite bookstore; The RoseRock Cafe* on South Mingo Road. The recommended choice is the Reuben sandwich on marbled rye bread, which is excellent, by the way.
The only problem with recording in public is that you’re subjected to random sounds, like the phone in the background that seems to ring and ring and ring. I know that the bookstore is staffed well enough that someone could have picked up. But that’s why we chose the cafe setting because we wanted those ambient sounds. Plus, there’s something ironic about discussing a security topic in a public place.
Length: 10:29 minutes. Format: MP3. Rating: G for all audiences.
This short podcast has a lot of good information in it about how to protect yourself. Over the coming weeks and months, Preston and I will return to public places to discuss cybersecurity and maybe even conduct a few impromptu interviews along the way.
*RoseRock Cafe & Bakery is not a SecurityNOW show sponsor, but they were kind enough to allow us to record our show there.
If you presume that your cloud solution protects you from data loss, you’d better think again and listen to this podcast about cloud data protection. CTERA‘s Senior Product Marketing Manager, Jim Crook, discusses cloud data protection survey results, mentions a free ebook, and gives an overview of cloud data protection, ransomware, and keeping your business operational through it all.
Preston, Jim, and I want to enlighten everyone to the fact that just because you have your data in the cloud, it’s not necessarily protected from loss. Accidental deletion, disasters, malware, and service failure can lead to data loss and outages for your business. Get the scoop on making some good decisions about protecting your data in this podcast.
Format: MP3. Length: 23:08 mins. Rating: G.
CTERA was founded by IT security veterans, who in 2008 identified the transformation that cloud computing would bring to enterprise IT, and the challenges this transformation presented for infrastructure management, data governance, privacy and security.