Data infrastructure optimization software
Data integration and quality software
Data availability and security software
Cloud solutions

2018 Best of Data Availability and Security – Recovering and Securing Your Data

Next up, as our Best of 2018 series moves along, we have Data Availability and Data Security. So far we covered the best of Data Quality and Big Data.

Read on for the top ten Data Availability and Security posts.

#10 6 Reasons Your Data May Become Unavailable

Highly available data means data that is accessible virtually without interruption. What stands in the way of high availability and your data? We kick off the countdown with a list of common reasons why data may become unavailable. Read more >

#9 Dangers of Encryption on the IBM i (AS/400, iSeries): 7 Pitfalls to Avoid

IBM’s security implementation on the IBM i platform is good, but that doesn’t mean that it’s immune from data breaches. All PCs and servers on the same network as your IBM i server are potential attack points for a data breach. There’s no doubt that cyber criminals know that the IBM i server is a rich target. Implementing encryption in IBM i Db2 is an essential part of an in-depth defense strategy. But there are lots of pitfalls to avoid. Read more >

#8 The Latest in High Availability Solutions With MIMIX 9

This has been a turbulent year for IT professionals working in all industries. Resilience has routinely made the headlines as technology-related disasters have impacted scores of organizations. IT professionals are called upon to provide an enterprise infrastructure that can sustain severe shocks and protect information. Read more >

#7 Big Data Disaster Recovery Preparation Tips

All organizations should have a disaster recovery plan in place. However, the importance of disaster recovery is even greater for companies that rely heavily on data to drive their business, and that need to restore data-based operations quickly in order to get back to business following a disaster. Read more >

#6 The State of IBM i: Facts & Trends about IBM i Systems in 2018

Unless you work with IBM i systems, you may not think much about this line of computers. But perhaps you should. Although IBM’s midrange systems, which date back to the release of the AS/400 in the late 1980’s, are now older than plenty of people in the IT workforce, they remain an important part of IT infrastructures. Read more >

The Ultimate Buyers Guide to HA-DR Solutions

#5 IBM POWER vs. x86: The Key Differences

What makes System i different from other platforms? A large part of the answer lies in the CPU architectures that System i servers use: System i relies on IBM POWER microprocessors, whereas most other modern computers and servers use the x86 architecture. And just what does System i’s use of POWER chips mean? Read more >

#4 Data Availability 101: What Data Availability Means and How to Achieve It

What is data availability, and what does data availability mean for your business? Put simply, data availability refers to the ability of data to remain accessible at all times, including following unexpected disruptions. Read more >

#3 What Do Hackers Really Want to Do With Your Data?

You know hackers want to steal your data. But do you know why? Understanding hackers’ motives is important for developing strong data protection strategies. If you don’t know exactly why attackers want to steal your data, it’s difficult to plan effective measures for stopping them. Read more >

#2 AES vs PGP Encryption: What is the Difference?

In the world of data security there are many different types of encryption, but arguably the two most common are AES and PGP. With so many three-letter acronyms in the technical landscape, it’s easy to get lost in data security conversations. So let’s catch up! Read more >

#1 AES vs. DES Encryption: Why Advanced Encryption Standard (AES) has replaced DES, 3DES and TDEA

Every so often, we encounter someone still using antiquated DES for encryption. If your organization hasn’t switched to the Advanced Encryption Standard (AES), it’s time for an upgrade. To better understand why: let’s compare DES and AES encryption! Read more >

Check out our Whitepaper on choosing the right HA/DR solution!

0 comments

Leave a Comment

Related Posts