Quantcast
Channel: Data protection platforms – The SHI Blog
Browsing latest articles
Browse All 16 View Live

Image may be NSFW.
Clik here to view.

9 ways to protect your organization from ransomware

Despite a decline in the number of ransomware attacks over the past two years, there has been a dramatic increase in ransom demands. Recent attacks on Lake City, Florida, Riviera Beach, Florida,...

View Article



Image may be NSFW.
Clik here to view.

Using cloud to modernize data protection and optimize digital transformation

IDC research shows that 60% of organizations have embarked on a digital transformation (DX) journey. The purpose of a DX strategy is to create a “data-driven” organization that delivers faster, more...

View Article

Image may be NSFW.
Clik here to view.

5 practical tips for putting backup data in the public cloud

Overwhelmingly, organizations of all shapes and sizes are moving at least some of their workloads to the cloud. As cloud adoption continues, I predict more and more organizations will take a hybrid...

View Article

Image may be NSFW.
Clik here to view.

How a Cloud Architecture Review can help you improve workloads on Azure

Microsoft Azure releases thousands of updates and new features every year. If you’re like most organizations, you have trouble keeping up. At the same time, you want to make sure you’re taking full...

View Article

Image may be NSFW.
Clik here to view.

How SHI solved this school district’s backup problem with AWS

A Texas school district knew it had to do something about its backup situation. At the time, it was using two products for its backups — one for its databases and one for its original infrastructure –...

View Article


Image may be NSFW.
Clik here to view.

5 keys to successful privileged access management

Cybercriminals are targeting our most valuable systems and data, and privileged users offer the proverbial “keys to the kingdom.” The abuse of privileged accounts can cause catastrophic damage to...

View Article

Image may be NSFW.
Clik here to view.

Guidelines for incident response: The most important steps in the lead up and...

Hackers see opportunity during global incidents. It doesn’t matter if it’s an earthquake or tsunami, attackers can use these worldwide events to springboard their campaigns. And they’re capitalizing on...

View Article

Image may be NSFW.
Clik here to view.

4 ways AI is changing how IT leaders approach endpoint security

Security consists of many systems. You have intrusion detection and prevention systems (IDS/IPS). You have security information and event management (SIEM), log management, and data loss prevention...

View Article


Image may be NSFW.
Clik here to view.

How to improve threat detection and response with MITRE ATT&CK

Nine hours. That’s the average time it takes a cyberattack to go from initially compromising a network to lateral movement, according to a recent threat report. Detecting and responding to intrusions...

View Article


Image may be NSFW.
Clik here to view.

Simplifying backups: How organizations can optimize their data protection...

Your data is one of your most valuable assets. It needs to be accessible and recoverable at any time, regardless of whether it resides on premises, in the public cloud, or both. An outage or a data...

View Article
Browsing latest articles
Browse All 16 View Live




Latest Images