Data Protection – The Evolution
The early days of data protection were built on multiple standalone point solutions, including some form of data backup, anti-virus software to protect endpoints/servers and firewalls to protect Internet inbound/outbound traffic. Disaster Recovery plans were minimally written, however, barely tested and rarely updated. The lack of integration among these standalone point solutions resulted in higher complexity and cost as well as increased security risks.
In the last decade, enterprise workloads have been moving outside the four walls of the data centers to Cloud Service Providers for Software as a Service applications and infrastructure. This in turn has increased the complexity for companies to secure their data and their customer's data.
RestorePoint’s Data Protection Solutions enable companies to protect data from the endpoint (e.g. PCs, mobile devices, IoT, servers) across the network to the application. Our platform incorporates policy-based authentication of users, applications, devices, and locations. To protect our customer’s endpoints from known and unknown malware and viruses, we have moved from traditional (legacy) anti-virus software to a multi-method prevention approach with real-time threat intelligence, all supported by the company’s Advanced Engineering Team – 24x7.
By leveraging best-in-class software tools, instead of traditional hardware-based point solutions, we have the flexibility to run our services in one or more clouds, on-premises or in a hybrid cloud configuration. Over time our Data Protection Platform has evolved from Proactive --> Adaptive. Incorporating automation, machine learning and artificial intelligence into our platform has further increased efficiency of our Engineering Team by moving from man vs. machine to machine vs. machine methodologies in order to combat the ever-increasing threat landscape.
The Next Phase of Data Protection: Data Life Cycle Management (Visibility, Analytics and Control)
With the exponential growth of data and as more cloud services are adopted, companies are losing visibility and control of their data. Data is no longer stored and secured in a single repository but is now dispersed amongst multiple clouds and Cloud Service Providers. This is creating multiple business challenges: (1) Where is my data and when is it being accessed? (2) Who has access to the applications and data? (3) What types of data are being stored and does it meet compliancy and reporting requirements? (4) What is the "age" of my data and should I consider data archival or certified data destruction?
To meet these business challenges, our Data Life Cycle Management Service, which extends into multiple clouds and Cloud Service Providers, provides businesses with the analytics to gain visibility and control of their users, applications and data. This helps companies meet compliancy requirements, mitigate risk, control data growth and ultimately reduce costs.
This Week’s Sponsor
Angus Systems is a leading provider of customer driven mobile and cloud-based work order and operations management solutions for commercial real estate. Our software supports over 2 billion square feet across North America in buildings from 20,000 to portfolios of more than 100 million square feet. Visit www.angus-systems.com to learn how we help our clients shine.
UPCOMING REALCOMM WEBINARS
Commercial and Corporate Real Estate Cyber Risk - Developing a Comprehensive Strategy - 10/25/2018
Hardly a day goes by that we don’t hear about a Cyber breach. The most recent of scale was Equifax, the credit reporting agency in which credit information of 143 million of its clients was breached. While most of the incidents we hear about involve data or financial theft, there is a looming threat…our built infrastructure. This infrastructure includes everything from power plants to dams, but also includes the millions of buildings we use every day to work, shop, learn, recreate, manage our health and more. The threats range from unwanted building access to pirating of video surveillance and everything in between. This webinar will focus on the entire spectrum of Commercial and Corporate Real Estate cyber challenges, solutions and strategies.
Founder of Realcomm Conference Group, an education organization that produces Realcomm, IBcon and CoRE Tech, the world's leading conferences on technology, automated business solutions, intelligent buildings and energy efficiency for the commercial and corporate real estate industry. As CEO, Jim interacts with some of the largest companies globally pertaining to some of the most advanced and progressive next generation real estate projects under development.
Tom Shircliff is a co-founder and principal of Intelligent Buildings, a nationally recognized smart real estate professional services company that was started in 2004. Intelligent Buildings provides planning and implementation of next generation strategy for new buildings, existing portfolios and urban communities. Tom is a speaker and collaborator with numerous universities and national laboratories, a gubernatorial appointee for energy strategy and policy and founding Chairman of Envision Charlotte, a Clinton Global Initiative.
As CIO at Meridian Capital, Sandy Jacolow oversees the firm’s nationwide innovation and technology initiatives that support the company’s brokerage, investment sales and retail leasing businesses and growth activities.
Ron Victor is a Silicon Valley based technology entrepreneur with 20 years of experience and expertise launching new ventures at start-ups and fortune 1000 technology companies. To-date he has enabled raising more than $30Million in start-up capital for multiple start-ups in silicon-valley. Ron has founded and led three companies to-date with successful exits. His latest venture is IoTium Inc. – a Silicon Valley start-up that provides a secure, cloud-managed, easy-to-deploy software defined network infrastructure for all IoT verticals.
Coleman Wolf has extensive experience developing enterprise-wide access control and alarm monitoring systems, developing business analyses, and conducting detailed security surveys and assessments of corporate offices, power generation plants, and facilities related to national critical infrastructure. Coleman has also managed numerous security system installation and upgrade projects. He holds a Master of Science, Computer Information Systems degree from Northwestern University and a Bachelor of Science, Electrical Engineering degree from the University of Michigan. He is also CPP (Certified Protection Professional) and CISSP (Certified Information Systems Security Professional). Coleman also holds the following Professional / Civic Affiliations: ASIS (Member of American Society for Industrial Security), Chairman of the ASIS Information Technology Security Council, and is an active member of the ASIS Security Architecture and Engineering Council.