Laz Vekiarides, CTO and Co-founder of ClearSky Data and I discuss a new approach to cloud storage–which deprecates the old 3-2-1 rule of making backups. Every year businesses consume more and more expensive disk space to copy, re-copy, and store data as backups, as disaster recovery, and for archival purposes. Preventing that waste is the main thrust of ClearSky Data’s primary storage, cloud backup, and disaster recovery solutions. The service is elastic and uses a “pay-as-you-use” philosophy.
Laz explains why this solution is more economical for your business and also makes your business more resilient to failure. We discuss a paradigm shift in backup methodology and the importance of business continuity.
Length: 21:36 minutes. Format: MP3. Rating: G for all audiences.
ClearSky allows enterprises to access all data wherever it’s needed, on-prem or in the cloud, without ever needing to replicate the data. That’s right, no more making copies. The ClearSky service is fully elastic; pay for only what you use and scale up or down on-demand.
Copyright 2017 The SecurityNOW Podcast Show. License: CC BY.
Preston and I had a good discussion with Commvault‘s Senior Director of Product Management, Don Foster. When most people, and possibly you, think of Commvault, you think backup and restore. But Commvault is much more than simple backup and restore activities; it covers the entire gamut of data protection for your business. Commvault is a common word for IT old-timers and newcomers alike since it’s been around for 30 years.
In this podcast, we cover data protection as it relates to backup, restore, business continuity, recovery, and more. Data protection is a company’s consistent defense against theft, data exfiltration, data loss, insider threats, ransomware, and disasters. Disaster recovery is another huge chunk of what Commvault does. We touch on every aspect of enterprise data protection in this podcast.
You have to remember that not all security topics deal with passwords, encryption, and policies–some of it has to do with the actual mechanics of protecting your data. Think disaster recovery.
Think about what Commvault offers you. We’ve all had backups and restores fail on us–even after multiple checks. What Commvault offers is the assurance that your data doesn’t have to be restored to its original backup point to be readable and usable, when the worst happens. Don explains this service further in the podcast. We also cover mobile data protection in the podcast. This one is a few minutes longer than our average podcast but I think you’ll agree that your time will be well spent by listening to it.
Length: 27:45 minutes. Format: MP3. Rating: G. License: CC BY.
Dave Packer, Head of Corporate and Product Marketing at Druva and I spoke about Druva’s In-Sync and Phoenix products, security, backup, restore, and disaster recovery. We also discussed how your data is encrypted in flight during backup, how it’s stored encrypted, and how you get restored via an encrypted link. I also told him how much I love Druva In-Sync because it never bogs down my workstation for backup–in fact, I never know it’s running.
If you presume that your cloud solution protects you from data loss, you’d better think again and listen to this podcast about cloud data protection. CTERA‘s Senior Product Marketing Manager, Jim Crook, discusses cloud data protection survey results, mentions a free ebook, and gives an overview of cloud data protection, ransomware, and keeping your business operational through it all.
Preston, Jim, and I want to enlighten everyone to the fact that just because you have your data in the cloud, it’s not necessarily protected from loss. Accidental deletion, disasters, malware, and service failure can lead to data loss and outages for your business. Get the scoop on making some good decisions about protecting your data in this podcast.
Format: MP3. Length: 23:08 mins. Rating: G.
CTERA was founded by IT security veterans, who in 2008 identified the transformation that cloud computing would bring to enterprise IT, and the challenges this transformation presented for infrastructure management, data governance, privacy and security.