Advisory Banner

ADVISORY

ADVISORY NEWSLETTERS

Data Protection – The Evolution

Vendor Profile

The early days of data protection were built on multiple standalone point solutions, including some form of data backup, anti-virus software to protect endpoints/servers and firewalls to protect Internet inbound/outbound traffic. Disaster Recovery plans were minimally written, however, barely tested and rarely updated. The lack of integration among these standalone point solutions resulted in higher complexity and cost as well as increased security risks.

In the last decade, enterprise workloads have been moving outside the four walls of the data centers to Cloud Service Providers for Software as a Service applications and infrastructure. This in turn has increased the complexity for companies to secure their data and their customer's data.

RestorePoint’s Data Protection Solutions enable companies to protect data from the endpoint (e.g. PCs, mobile devices, IoT, servers) across the network to the application. Our platform incorporates policy-based authentication of users, applications, devices, and locations. To protect our customer’s endpoints from known and unknown malware and viruses, we have moved from traditional (legacy) anti-virus software to a multi-method prevention approach with real-time threat intelligence, all supported by the company’s Advanced Engineering Team – 24x7.

By leveraging best-in-class software tools, instead of traditional hardware-based point solutions, we have the flexibility to run our services in one or more clouds, on-premises or in a hybrid cloud configuration. Over time our Data Protection Platform has evolved from Proactive --> Adaptive. Incorporating automation, machine learning and artificial intelligence into our platform has further increased efficiency of our Engineering Team by moving from man vs. machine to machine vs. machine methodologies in order to combat the ever-increasing threat landscape.

The Next Phase of Data Protection: Data Life Cycle Management (Visibility, Analytics and Control)
With the exponential growth of data and as more cloud services are adopted, companies are losing visibility and control of their data. Data is no longer stored and secured in a single repository but is now dispersed amongst multiple clouds and Cloud Service Providers. This is creating multiple business challenges: (1) Where is my data and when is it being accessed? (2) Who has access to the applications and data? (3) What types of data are being stored and does it meet compliancy and reporting requirements? (4) What is the "age" of my data and should I consider data archival or certified data destruction?

To meet these business challenges, our Data Life Cycle Management Service, which extends into multiple clouds and Cloud Service Providers, provides businesses with the analytics to gain visibility and control of their users, applications and data. This helps companies meet compliancy requirements, mitigate risk, control data growth and ultimately reduce costs.

Dave Albano, President & CEO, RestorePoint
Dave Albano is currently CEO of RestorePoint and under his leadership, the company has expanded their strategic vision and initiatives to deliver a comprehensive data protection platform for enterprise clients globally. Prior to RestorePoint, Dave enjoyed a very successful career with AT&T in a variety of leadership roles including software and product development, strategic planning and enterprise business sales/managed services.

This Week’s Sponsor

Angus Systems is a leading provider of customer driven mobile and cloud-based work order and operations management solutions for commercial real estate. Our software supports over 2 billion square feet across North America in buildings from 20,000 to portfolios of more than 100 million square feet. Visit www.angus-systems.com to learn how we help our clients shine.

UPCOMING REALCOMM WEBINARS

Commercial and Corporate Real Estate Cyber Risk - Developing a Comprehensive Strategy - 10/25/2018

Hardly a day goes by that we don’t hear about a Cyber breach. The most recent of scale was Equifax, the credit reporting agency in which credit information of 143 million of its clients was breached. While most of the incidents we hear about involve data or financial theft, there is a looming threat…our built infrastructure. This infrastructure includes everything from power plants to dams, but also includes the millions of buildings we use every day to work, shop, learn, recreate, manage our health and more. The threats range from unwanted building access to pirating of video surveillance and everything in between. This webinar will focus on the entire spectrum of Commercial and Corporate Real Estate cyber challenges, solutions and strategies.

headshot for Jim Young
Jim Young Realcomm
Jim Young Co-Founder & CEO Founder of Realcomm Conference Group, an education organization that produces Realcomm, IBcon and CoRE Tech, the world's leading conferences on techno
headshot for Jim Young
Jim Young
Co-Founder & CEO
Realcomm
LinkedIn

Founder of Realcomm Conference Group, an education organization that produces Realcomm, IBcon and CoRE Tech, the world's leading conferences on technology, automated business solutions, intelligent buildings and energy efficiency for the commercial and corporate real estate industry. As CEO, Jim interacts with some of the largest companies globally pertaining to some of the most advanced and progressive next generation real estate projects under development.

headshot for Tom Shircliff
Tom Shircliff Intelligent Buildings
Tom Shircliff Co-Founder Tom Shircliff is a co-founder and principal of Intelligent Buildings, a nationally recognized smart real estate professional services company that was
headshot for Tom Shircliff
Tom Shircliff
Co-Founder
Intelligent Buildings
LinkedIn

Tom Shircliff is a co-founder and principal of Intelligent Buildings, a nationally recognized smart real estate professional services company that was started in 2004. Intelligent Buildings provides planning and implementation of next generation strategy for new buildings, existing portfolios and urban communities. Tom is a speaker and collaborator with numerous universities and national laboratories, a gubernatorial appointee for energy strategy and policy and founding Chairman of Envision Charlotte, a Clinton Global Initiative.

headshot for Sandy Jacolow
Sandy Jacolow Meridian Capital
Sandy Jacolow CIO As CIO at Meridian Capital, Sandy Jacolow oversees the firm’s nationwide innovation and technology initiatives that support the company’s brokerage, i
headshot for Sandy Jacolow
Sandy Jacolow
CIO
Meridian Capital

As CIO at Meridian Capital, Sandy Jacolow oversees the firm’s nationwide innovation and technology initiatives that support the company’s brokerage, investment sales and retail leasing businesses and growth activities.

headshot for Annette Prater
Annette Prater Brookfield Properties
Annette Prater SVP, CIO
headshot for Annette Prater
Annette Prater
SVP, CIO
Brookfield Properties

headshot for Ron Victor
Ron Victor IoTium
Ron Victor Founder & CEO Ron Victor is a Silicon Valley based technology entrepreneur with 20 years of experience and expertise launching new ventures at start-ups and fortune
headshot for Ron Victor
Ron Victor
Founder & CEO
IoTium

Ron Victor is a Silicon Valley based technology entrepreneur with 20 years of experience and expertise launching new ventures at start-ups and fortune 1000 technology companies. To-date he has enabled raising more than $30Million in start-up capital for multiple start-ups in silicon-valley. Ron has founded and led three companies to-date with successful exits. His latest venture is IoTium Inc. – a Silicon Valley start-up that provides a secure, cloud-managed, easy-to-deploy software defined network infrastructure for all IoT verticals.

headshot for Coleman Wolf
Coleman Wolf Environmental Systems Design
Coleman Wolf Security Practice Leader Coleman Wolf has extensive experience developing enterprise-wide access control and alarm monitoring systems, developing business analyses, and conduc
headshot for Coleman Wolf
Coleman Wolf
Security Practice Leader
Environmental Systems Design

Coleman Wolf has extensive experience developing enterprise-wide access control and alarm monitoring systems, developing business analyses, and conducting detailed security surveys and assessments of corporate offices, power generation plants, and facilities related to national critical infrastructure. Coleman has also managed numerous security system installation and upgrade projects. He holds a Master of Science, Computer Information Systems degree from Northwestern University and a Bachelor of Science, Electrical Engineering degree from the University of Michigan. He is also CPP (Certified Protection Professional) and CISSP (Certified Information Systems Security Professional). Coleman also holds the following Professional / Civic Affiliations: ASIS (Member of American Society for Industrial Security), Chairman of the ASIS Information Technology Security Council, and is an active member of the ASIS Security Architecture and Engineering Council.

headshot for Wade Hughes
Wade Hughes 5Q Partners
Wade Hughes CEO
headshot for Wade Hughes
Wade Hughes
CEO
5Q Partners
LinkedIn

headshot for Don Goldstein
Don Goldstein AdKahn
Don Goldstein CEO
headshot for Don Goldstein
Don Goldstein
CEO
AdKahn

headshot for Malcolm Hobbs
Malcolm Hobbs Join
Malcolm Hobbs VP Marketing & Market Development
headshot for Malcolm Hobbs
Malcolm Hobbs
VP Marketing & Market Development
Join