The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.
Infinidat has recently released version 4.0 of it's InfiniBox software, the brains behind its speedy, massive, hybrid flash/hard-disk storage arrays. What’s the big deal? A hybrid storage array that meets or beats all-flash arrays on all their traditional strong points, at the cost you’d expect from inexpensive spinning-disk arrays, plus seven nines reliability and super-fast synchronous data replication so that no data is ever at risk of being lost. As more companies discover the benefits of InfiniBox, the notion that all-flash arrays are suitable for high-performance storage may prove to be just another flash in the pan.
Now that National Cyber Security Awareness Month has come to a close, we think it’s a good time to talk about what to actually do about cybersecurity. After all, awareness without action isn’t much use! Before we dive in, however, let’s talk about some thought patterns we often see that prevent companies from taking effective action on cybersecurity.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
With Hewlett Packard Enterprise's recent announcement that it will soon be bringing the ground-breaking InfoSight technology to its 3PAR StoreServe, the value of HPE's recent acquisition of Nimble Software is more clear than ever. The move means InfoSight will soon be available across a full portfolio of HPE data solutions: from systems for small businesses all the way up to the largest enterprises. This makes HPE’s storage portfolio the most complete in the industry. Since InfoSight learns by analyzing data from its installed base, it's about to get a whole lot smarter.
Equifax made some serious mishaps lately, both technically and incident response. What’s really disturbing: while this is the largest, this is not an isolated incident. We won’t cover the details here, since there are plenty of sources where you can find information about the breach, its consequences, and what has happened after that. What we will cover is some thoughts around what we can all learn from the events leading up to, during, and after the breach. At Kelser, we don’t want any company to fall victim to the same incident and aftermath that Equifax did. We match our recommendations to our clients’ business objectives, establishing a comprehensive and multi-layered strategy to manage risk before, during and after a cybersecurity incident.
Backing up your data is a necessity. There are simply too many ways in which data can be lost, ransomed, or compromised in some way. Your original information can get deleted - by accident or on purpose. Your system or network can fail. A hurricane or tornado can strike. That’s why you have another copy safe and sound. It’s why you also have a disaster recovery plan in place to make sure your data is safe. You do have a disaster recovery plan, right?
As technology relentlessly pushes forward, you and your organization will undoubtedly need to upgrade your hardware. However, you can’t simply forget about your old hardware while reaping the benefits of replacing it with the latest and greatest. You should be excited about the upgrade, but how will you transfer data from your old equipment to the new? How will you erase data from the original hardware?