As the Dell EMC World 2017 show came to a close in Las Vegas, our team walked away with an amazing experience.
Dell EMC World 2017 – Las Vegas is just around the corner! From May 8-11th you can find us at Dell EMC's biggest technology expo along with dozens of other presenters, experts, celebrities and more.
It’s difficult for an administrator to get control of network storage when space begins to dwindle. Users see storage space as an unlimited supply for all of their files including videos, music, and personal executables.
When primary storage space is exhausted, the administrator can go the expensive route and buy new space, or he can assess storage usage and make the right changes to clear junk files from the network.
Hacking is big money for the right data. Hackers have moved on from simple email worms and now target businesses. Their goal is to collect enough data to sell it on the black market. One way they can collect massive amounts of data is to drop malware on network storage. The malware has the ability to spread like wildfire and the damage to the corporation is immense.
Several regulatory bodies require file audit trails. HIPAA regulations require healthcare organizations to have extensive security on network files and data including audit trails that specify who accessed and edited data.
If you run any type of organization that requires healthcare data from your customers, you need to have the right audit trails in place.
If you're new to file archiving, you probably aren't familiar with the term "stub." A stub is a file that points to a file, similar to the concept of a shortcut on a desktop. Instead of pointing to an active file, a stub points to an archived file that has been moved to a new location.
When you start archiving files in an enterprise environment -- which you should do to keep network storage capacity optimized -- you will work with stubs.
Insider threats are one of the leading causes for data leaks. These threats are why your private organization’s data could be exposed to competitors or outsiders who want to sell it on the dark web.
Insider threats include disgruntled employees or even just an innocent employee who accidentally fell for a phishing scam and loaded malware on a workstation.
It’s an interesting question because it involves a simple juxtaposition of four words. How important can that possibly be?
However, the order of those words is critical when we examine the answers in the light of IT budgets capital (CapEx) and operational expenses (OPEX) regarding their relationship to technology costs and return on investment (ROI).
Yes, the business of storing and retrieving data has entered the business realm of having to prove its worth to the corporate enterprise. It’s a rather unorthodox arrangement to figuring out ROI but it does reveal some insightful facts about the cost and value of doing file data storage the right way.
Each year, companies spend millions in cyber security threat protection and response. A recent Ponemon study shows that cyber crime increased by 19% in 2015. The average annual loss for companies is almost $8 million, and threats continue to increase every day. The biggest threat to corporations is their employees, which means more effort should be placed in insider network monitoring rather than more effort on external threats.
You’ve gotten into the habit of just adding more servers and hard drives when you see the capacity of each of the drives is approaching the magic 85% full mark. I know that early in my involvement with file data storage that was the extent of the analysis of the data backup system to determine when a new investment was needed. There wasn’t any practical intelligence available for what the current file types were in the environment, who were the culprits storing data by the gigabyte and why. The metrics just weren’t being collected and the analysis was done haphazardly and without performance parameters in mind. In short, I was flying blind, storing data that didn’t need to be stored, losing data when hard drives crashed from exceeding their safe capacity limits and always having to beg the CFO for money to add hardware to the storage infrastructure as unplanned expenditures. IT as a cost center took on the real meaning of being a money pit with no ROI to show for the effort.