VAST Perspectives
6 Steps to Keeping Data Safe in the Cloud
There are many layers to the cloud which means you need many layers of protection. Cloud providers will handle keeping the physical premises and the physical machines safe, but you remain responsible for your virtual machines, your applications, your network, and your...
GDPR Fines Highlight the Cost of Ignoring Data Privacy
The GDPR deadline is far behind us now, and its impact is starting to be felt. Many companies met their obligations, but those who didn't may want to step up their efforts. Anyone who doubted the EU was serious about data privacy needs to think again following the...
3 Approaches to Reducing Cloud Spending
Cloud costs can easily spiral out of control. You only pay for what you use, but self-service lets instances be brought online with no centralized oversight. Over-provisioning and under-utilizing lead to wasted spending. Fortunately, there are ways to ensure that...
7 Priorities for Cloud in 2019
Cloud has become the infrastructure of choice for information technology in many companies. Where should your cloud effort go this year? Multi-cloud. If one cloud is good, is more than one cloud better? More companies are adopting multi-cloud solutions to take...
Digital Transformation Requires Security Transformation
Digital transformation is almost entirely about data. You need to generate and collect more data; use it more often; use it in more places; and use it faster. As a result, data security needs to be a big part of any transformation project. Despite that, security is...
Tackle Cloud Security Challenges in 2019
Cloud security continues to be one of the most important issues for companies that adopt this technology. The threats to data and applications in the cloud continue to evolve as technology changes and hackers continually become more sophisticated. New Security...
Increase Your Cloud Security With a CASB
With the huge success of the cloud—some surveys show cloud being used by 96 percent of respondents—the risks to information have exploded. Cloud obliterates the perimeter where most traditional data security efforts focused. New approaches are needed; that's why...
Use Secondary Storage to Drive Digital Transformation
Old-school thinking is that secondary storage is unimportant. It can be safely ignored. The new way of thinking today is that secondary storage is vitally important to your digital transformation. Digital transformation relies on data, and there's much more data on...
Keep Tape If You Want, But Use the Cloud for Backups Too
Does anyone still backup to tape? Turns out the answer is yes, lots of companies still use tape as a backup media. If your goal is 3-2-1 backup (keeping at least 3 copies of your data, storing them on at least 2 different types of storage, and keeping 1 of them off...
Be Alert for these Dangerous Amazon Web Service Configuration Errors
Many of the biggest security threats on Amazon Web Services (AWS) come from misconfigurations. Default settings can leave resources publicly accessible and unprotected. These are the configuration errors you need to avoid: 1. Empowered root accounts Root accounts are...