We have just added a great new feature – File Approvals – to our Enterprise File Fabric. Here’s an example of how it works:by
HIPAA (the Health Insurance Portability and Accountability Act), sets the standard for protecting sensitive patient data. Any company that handles protected health information (PHI) must ensure that strict protocols and protective security measures are adhered to. But maintaining the HIPAA standards of security over electronic information can be difficult especially with outdated storage systems.by
Data Governance policies play a key role in all organisations that handle digital information. Ensuring you have strong Data Governance policies is one thing, but how do you implement them? Being unable to implement them properly exposes your company to threats, whether they be internal, or external.by
Object Storage is the way forward for all your storage needs, it’s adaptable meaning it grows with your storage needs, it’s economical, being that you only pay for what you need, but it does also have a number of drawbacks. Object Storage is not easily accessible to end users, and often it lacks auditing controls, which can open your business up to a whole range of problems around security and governance of data.
So what do you do? Struggle on with Block storage that is often increasingly difficult to enlarge when your company grows? Or move to Object storage and struggle to keep control over your data?by
We made an announcement on June 23rd about our Technology collaboration with Red Hat. That same week, Red Hat unveiled Red Hat Ceph Storage 2 with enhanced object storage capabilities and improved ease of use.by
Last week, Yahoo’s headquarters in Sunnyvale California hosted Ceph Day. A community event run by the team at Red Hat providing exposure for Ceph users and the team at Red Hat to talk about successes, challenges and use cases around Ceph in both Red Hat and non-Red Hat environments.by