Hear from guest blogger Jim Reavis of the Cloud Security Alliance why this year’s CSA Summit will prove that cloud computing has finally come of age—and that cloud data security is finally coming out of the closet. … Read More
21st century data migration looks a lot different than it did in the twentieth. Modern endpoint backup takes data migration out of the Dark Ages of disks and cables and device proximity and makes the cloud-to-device process simple, secure and painless. … Read More
Traditional IT equals overhead. This long-held universal belief coupled with the desire to drive down operational expenses often results in corner cutting. No need to cut corners, there's a better way to accomplish more with the endpoint backup solution you already have. … Read More
It’s 2016, and the tide is finally turning toward the enterprise cloud. After 2014 saw cloud adoption lag behind expectations, 2015 saw 84 percent of organizations increase their cloud usage. Ken Rothenberger, Code42’s new vice president of Cloud Operations, talks about the forces driving this shift and what to expect in the enterprise cloud landscape for 2016 and beyond. … Read More
Guest blogger Jim Reavis discusses how security professionals are rethinking best practices as a result of being exposed to cloud computing, and the key security priorities organizations must consider as they begin to depend upon a critical mass of cloud services. … Read More
Oceans of ink have already been spilled extolling Uber’s innovative practices and growing profits, but here’s one aspect getting less attention: How the company’s nearly 100 percent cloud-based business empowers its vast network of mobile workers (the drivers). … Read More
The enterprise majority still requires on-premises, private cloud deployments to achieve data security goals. But should the storage location itself be the primary concern? It’s time to stop assuming on-premises deployments are the most secure cloud architecture available. … Read More
Now that business cloud usage is ubiquitous, you’d think we could get past all the hype around cloud security, and just start treating the cloud like any other IT platform that needs a rigorous, well-rounded security strategy with appropriate access controls, encryption, you know the drill. … Read More