Taneja Group | Security
Join Newsletter
Forgot
password?
Register
Trusted Business Advisors, Expert Technology Analysts

Items Tagged: Security

Profiles/Reports

EMC Acquires RSA

On June 29, EMC reached a definitive agreement to acquire RSA Security for an eye-popping $2.1B. As part of the merger, RSA will become the Information Security Division within EMC – a signal that EMC is serious about building a business around data security and management. EMC’s Analyst Day in New York on June 7th was a harbinger of this move.

Publish date: 07/01/06
Profiles/Reports

Key Confusion

It is hard to pick up a newspaper these days without reading about another high profile data security breach, whether it is the loss of a laptop or a tape. Stored data is finding its way outside the corporate perimeter and into the hands of malicious individuals. The implication is clear - data is now mobile. No longer can IT assume that important data is only stored within the confines of the glass house.

Publish date: 10/01/06
Profiles/Reports

Storage Security Key Management

It is hard to pick up a newspaper these days without reading about another high profile data security breach, whether it is the loss of a laptop or a tape. Stored data is finding its way outside the corporate perimeter and into the hands of malicious individuals. The implication is clear - data is now mobile. No longer can IT assume that important data is only stored within the confines of the glass house.

Publish date: 03/01/07
Profiles/Reports

Siafu

Small to medium-sized businesses (SMBs) share the same needs as the enterprise for storage security. But lacking enterprise storage budgets and specialized IT staff, they have far fewer options open to them. Regardless, SMBs are facing the same compliance pressures that have bedeviled the enterprise.

Publish date: 03/01/07
Profiles/Reports

The Growing Importance of Storage Security & Key Management - Market Profile

It is hard to pick up a newspaper these days without reading about another high profile data security breach, whether it is the loss of a laptop or a tape. Stored data is finding its way outside the corporate perimeter and into the hands of malicious individuals. The implication is clear - data is now mobile. No longer can IT assume that important data is only stored within the confines of the glass house. It is shared with business partners, replicated to multiple data centers, and copied onto different media types that may ultimately be transferred to a 3rd party.

Publish date: 04/01/07
Profiles/Reports

Priming the Storage Security Pump - Technology Brief

The storage security market is at an inflection point similar to the inflection point that disaster recovery and business continuance technologies went through earlier this decade. In the case of disaster recovery, the events of 9/11 coupled with natural disaster such as Hurricanes Katrina and Rita underscored the importance of and need for serious disaster recovery planning and business continuance technologies.

Publish date: 08/31/07
Profiles/Reports

Exchange Storage Consolidation with IBM System Storage N Series- Taming the Email Data Tsunami

In many corporations, email systems have become the lifeblood of an organization, supplanting phone and face-to-face communication. As a result, email is a mission critical platform for daily communications and a central repository for business critical data.

Publish date: 08/31/07
news / Blog

Feeling Secure: Enforcing Virtual Infrastructure Compliance

Reflex Systems, the established security appliance vendor, is tackling the concern about virtual machine security with Virtual Management Center.

  • Premiered: 01/23/09
  • Author: Taneja Group
Topic(s): Security Virtualization Reflex Systems
news / Blog

Virtual Server and Desktop Security: VMware vs Citrix-McAfee

David Marshall and I weigh in on what the Citrix-McAfee virtualization security announcement means.

  • Premiered: 06/01/10
  • Author: Taneja Group
Topic(s): Citrix Desktop Virtualization McAfee Security Server Virtualization VMSafe VMWare
Profiles/Reports

Riverbed Introduces Enterprise Disaster Recovery Support

Riverbed has expanded WDS to include enterprise DR support, enabling the efficient and secure transport of large datasets over the WAN from one data center to another. In this profile we will spotlight the first vendor with a product offering in this expanded WDS space: Riverbed. We believe that this ability is nothing less than a breakthrough in WDS.

Publish date: 11/12/07
news / Blog

A Major Cloud Milestone: Payment Data Security Reference Architecture

Until last month, the Payment Card Industry Data Security Standard gave no specific guidance for either virtualization or cloud computing. The new standard has finally changed that.

  • Premiered: 11/10/10
  • Author: Taneja Group
Topic(s): Cisco Cloud Computing HyTrust Security Virtualization VMWare
news / Blog

IT Managers and Virtualization: Plagued by Insecurity?

Are IT professionals themselves becoming insecure about the security of their virtual infrastructures? Is all of this media attention justified? We believe the answers to these two questions, respectively, are "a little bit" and "yes".

  • Premiered: 11/11/08
  • Author: Jeff Byrne
Topic(s): Security Server Virtualization virtual infrastructures virtual machines
Profiles/Reports

Mimecast - Cloud-Based Archiving, Security and Business Continuity for Email

Business communications have changed dramatically over the last decade where an enormous emphasis is now placed on electronic exchanges, email in particular.  From a business perspective, email is now a required process along with an acceptable, if not preferred, method of conducting business.  Email is easy, convenient, nearly instantaneous, and in today’s world of compliance, email provides a written record of communication.  This is a Product Profile on the Mimecast Unified Email Management solution.

Publish date: 11/22/10
Profiles/Reports

Company Profile: AccessData

Since its founding, AccessData has been a worldwide leader in computer forensics. The company developed its core technology to support cyber-security and eDiscovery markets, and has now has added industry-standard review capabilities to its eDiscovery line. The end result is an integrated architecture that enables AccessData to offer single-vendor efficiencies across the highest levels of digital forensics, cyber-security and litigation support. 

Publish date: 03/10/11
Profiles/Reports

EVault from i365 – Lab Validating EVault Endpoint Protection

In this Taneja Group Technology Validation exercise, we put an endpoint protection solution – EVault Endpoint Protection, a solution from i365, a Seagate company – to the test. Could the recently released, completely hosted (on top of the elastic Microsoft Windows Azure cloud) EVault Endpoint Protection suite be as quick to deploy and easy to use as i365 claims? To find out, we put the suite through the paces at a remote site – in essence simulating exactly what an EVault customer would see and do when they sign up for this cloud service. What did we find? Our conclusion is that it is easier and faster to protect the business with EVault Endpoint Protection than with anything else we’ve seen.

Publish date: 07/07/11
news

Moving applications to the cloud guide

The four-part cloud tips series by Arun Taneja, founder and president of Taneja Group, concludes with an explanation of which applications are best suited for the cloud. When moving applications to the cloud, what are the basic ground rules for what applications aren’t going to work and which ones might from a performance standpoint?

  • Premiered: 05/10/12
  • Author: Arun Taneja
  • Published: TechTarget: SearchCloudStorage
Topic(s): TBA Cloud TBA Applications TBA Security TBA DR TBA Big Data
news

Survey: Cloud security needs to be taken more seriously

There is no doubt that that the cloud is being adopted on a global level. How managers choose to leverage and maintain the services, however, vary between companies.

  • Premiered: 06/13/12
  • Author: Taneja Group
  • Published: Copperegg.com
Topic(s): TBA Cloud TBA Data protection TBA Security
news

CLOUD SECURITY CONTINUES TO RAISE QUESTIONS

Since its beginning, cloud computing has often been recognized as a paradox, giving businesses the ability to enhance mobility, agility and overall productivity at the cost of inherently weakened IT security capabilities. While this isn't necessarily always the case with the cloud, it is widely perceived that without additional protection, mission-critical applications and data in the virtual environments are more susceptible to exposure.

  • Premiered: 06/18/12
  • Author: Taneja Group
  • Published: Trend Micro - Simply Security
Topic(s): TBA Cloud TBA Security
Resources

Cloud storage issues on vendors, security, and infrastructure options

Arun Taneja, founder and consulting analyst at Taneja Group, discusses the most common cloud storage issues facing data storage managers with editors from SearchCloudStorage.com

http://searchcloudstorage.techtarget.com/video/Cloud-storage-issues-security-vendors-and-infrastructure-options

  • Premiered: 06/18/12 at OnDemand
  • Location: OnDemand
  • Speaker(s): Arun Taneja
  • Sponsor(s): SearchCloudStorage.com
Topic(s): TBA Topic(s): Cloud Topic(s): TBA Topic(s): Backup Topic(s): TBA Topic(s): Security Topic(s): TBA Topic(s): Public Cloud Topic(s): TBA Topic(s): Private Cloud
news / Blog

Symform Raises Cloud Storage Stakes

Sharing unused disk space and computing cycles has been around for a long time. But using this model for secure and available cloud-based backup is a whole new ballgame.

  • Premiered: 09/15/12
  • Author: Taneja Group
Topic(s): Symform Backup Cloud Distributed Availability Security