dcsimg

The GDPR: How to perform due diligence of Cloud service providers

One overlooked aspect of the GDPR (General Data Protection Regulation) is that it’s now much harder for organisations to pass the blame when a third party suffers a data breach. Data controllers – the organisations that dictate what information is processed – must give instructions for how data processors – the service providers – handle personal information. Unless the third party has explicitly … [Read more...]

Explained: the strengths and weaknesses of the Zero Trust model

In a US court of law, the accused are deemed to be innocent until proven guilty. In a Zero Trust security model, the opposite is true. Everything and everyone must be considered suspect—questioned, investigated, and cross-checked—until we can be absolutely sure it is safe to be allowed. Zero Trust is a concept created by John Kindervag in 2010 during his time as Vice President and Principal … [Read more...]

Why Your Organization’s Security Strategy Starts with a Cloud Security Policy

The IT industry has made significant strides with cloud computing security and many organizations remain anxious about emerging cloud security risks. A new generation of malware and hacking techniques continue to threaten different organizations’ data and apps on the cloud. We are seeing many different cloud security vulnerabilities being introduced through bringing your own device … The … [Read more...]

Explained: edge computing

Edge computing may seem like a foreign and future-facing term. Yet its applications are widespread and diverse, with the ability to transform the way we store, use, and share data and programs online. The implications of edge computing are far-reaching, trickling down from software development and business applications to everyday computing—even to gameplay. Recently, I followed a discussion … [Read more...]

Explained: What is containerization?

Containerization. Another one of those tech buzzwords folks love to say but often have no idea what it means. A better way to organize children’s toys? The act of bringing tupperware out to dinner to safely transport home leftovers? Another name for Russian dolls? Containerization is, of course, none of those things. But its definition might be best captured in a quick example rather than … [Read more...]

What Condusiv’s Diskeeper Does for Me

I'm a person who uses what he has. For example, my friend Roger purchased a fancy new keyboard, but only uses it on "special occasions" because he wants to keep the hardware in pristine condition. That isn't me--my stuff wears out because I rely on it and use it continuously. To this point, the storage on my Windows 10 workstation computer takes a heavy beating because I read and write data to my … [Read more...]

Data Protection and the risks associated with the Cloud

This book is intended to be an introduction to the risks involved in Cloud sourcing, to enable managers to ask the right questions. Suggestions are offered for the kind of risks an organisation’s use of the Cloud might generate, and the remedial measures that might be taken. These are given as examples only and are not intended to be a substitute for qualified legal or technical advice. Other … [Read more...]

5 Steps to Improving Your Cloud Security

The adoption of the cloud has come a long way in the past decade. In the early 2010s “The Cloud” was initially introduced as a buzzword, but today most organizations are employing the cloud for their business. Seventy-two percent of all businesses globally are dependent on some form of the cloud in their daily work … The post 5 Steps to Improving Your Cloud Security appeared first on … [Read more...]

Condusiv’s V-locity Technology Was Recently Certified as Citrix Ready

  We are proud to announce that Condusiv’s V-locity® I/O reduction software has been certified as Citrix Ready®. The Citrix Ready program helps customers identify third-party solutions that enhance virtualization, networking and cloud computing solutions from Citrix Systems, Inc. V-locity, our innovative and dynamic alternative to costly hardware overhauls, has completed a … [Read more...]

Case Study: Non-Profit Eliminates Frustrating Help Desk calls, Boosts Performance and Extends Useful Hardware Lifecycle

When PathPoint was faced with user complaints and productivity issues related to slow performance, the non-profit organization turned to Condusiv’s I/O reduction software to not only optimize their physical and virtual infrastructure but to extend their hardware lifecycles, as well.  As technology became more relevant to PathPoint’s growing organization and mission of providing … [Read more...]