The increasing scale, sophistication, and frequency of ransomware attacks necessitate that organizations acknowledge the vulnerability of all systems and datasets.
Fintechs’ sights are firmly set on the future and with that they are setting out clear technology priorities to adapt to the changing landscape.
As the increasing risk and accelerating pace of cyberattacks continue, the author of this article explores how deep content analytics enables unrivalled forensic analysis and reporting of cyberattacks.
The rate of cyberattacks is increasing each week, and it is forecast that cybercrime will cost enterprises $10.5 trillion in 20251.
A significant transformation is underway in many manufacturing enterprises, triggered by greater interaction between Operational Technology (OT) and IT systems
Retrieval-Augmented Generation (RAG) is a technique that enhances Large Language Models (LLMs) by incorporating external knowledge from a retrieval system.
World Back Up Day 2025: Protect your enterprises data with next generation Cyber Secure Backup
Next-gen data protection goes beyond traditional backup, restore and disaster recovery. Putting your enterprise’s data in an air-tight cyber repository is not the same as the conventional means of moving data to an online repository as a backup file. Traditional backup environments are high-value targets for cyber attacks.
Minimizing energy consumption, lowering carbon emissions, and promoting sustainable disposal of technology products means that Green IT is an essential component of an enterprise IT strategy, because it prioritizes practices and technologies that target reducing the environmental impact of IT operations, whilst also saving on operational expenses.
Revisiting Herzog's Dirty Dozen: The progress report
Back in 2022, the author introduced “Herzog’s Dirty Dozen” to shine a light on the challenges that enterprises face in their data infrastructure.
Strengthening financial resilience - What CFOs can take from DOGE's alleged findings
The Department of Government Efficiency (DOGE) recently claimed that nearly $4.7 trillion in federal payments are ‘almost impossible’ to trace due to tracking code issues.
Why every modern enterprise needs a storage champion
Today’s enterprises have the opportunity to advance the data infrastructure and be seen as a forward-thinking IT leader driving positive change.
Not only does Green IT help the environment, but it also helps the bottom line with dramatic CAPEX and OPEX savings.
The success equation requires that channel partners recognize, understand, and adapt to the trends affecting the channel for the next 12 months.
Recent research by Equals Money reveals that 90% of financial leaders were impacted by the Chancellor’s Autumn Budget, with over two-thirds (70%) choosing to delay or cancel planned investments.
There is new excitement about enterprise storage. Based on extensive customer, channel partner, and technical alliance partner input on a global basis, several trends are emerging.
Generative AI learning (GenAI) models are powerful, modern tools for automating interactive delivery of knowledge and information, but they often struggle to understand proprietary enterprise data. This leads large language models (LLMs) being prone to so-called “hallucinations” – fabricating answers instead of acknowledging that they don’t know the answer.
Customer experience continues to reign supreme as a key competitive differentiator. But for many organizations, the ability to delight customers by mastering the concept and execution of an exceptionally good customer experience can be challenging.
In the early days of enterprise storage, how to back up 1TB of data over 200 systems with a 10Mb/s network presented as a huge challenge.
Expanding a business internationally is one of the most promising paths to growth, allowing companies to access new markets, diversify their customer base, and seize fresh opportunities. However, as any seasoned leader can attest, this journey is not without its challenges.
The recent Strategic Technology Analysis Centre (STAC) Summit in New York City was the perfect venue to be teeming with discussions about how to solve the infrastructure-related problems facing the financial community.
The global cybersecurity threat is ever constant, and its impact on enterprises can be devastating.
Globally, data centres are consuming an estimated 240-340 TWh of electricity annually or around 1 to 1.3% of global final electricity demand, based on studies conducted in 2022.
The Post Office scandal has finally shone a light on the positives that forensic investigators can bring to troubled situations. The valiant forensic experts from Second Sight doggedly exposed the failings of the Horizon system despite all efforts to silence them and have now finally had their say at the Public Inquiry.
Operational technology (OT) security is designed to meet the unique security needs of OT environments. This includes protecting system availability, understanding OT-specific protocols, and blocking attacks targeting the legacy systems commonly used in OT environments. As such, OT is becoming increasingly important. In this article, the author discusses how security practitioners bridge the cultural chasm with OT engineers where cyber security is often seen as just one risk among
several.
Enterprises need to make sure they are fully securing their data, both at rest and in motion.With datastores moving between on-premises enterprise data centre and the public cloud in hybrid environments, storage administrators need to be ever vigilant for a cybersecurity event and 'firing on all cylinders' if they are to have a chance of protecting their enterprise data.
Winning or even being nominated for a business award not only boosts awareness of a company’s brand, products and services helping to gain new customers, but it also boosts staff morale and helps to attract and retain staff – people want to work for award winning businesses. But winning awards isn’t easy – it takes hard work.
Today’s customers want their enterprise systems to be faster, more performant, and capable systems that use less power and less data centre space, fuelling better OPEX, a smaller carbon footprint, and more successful outcomes for the business.
We live in a data-driven world and protecting data assets is a constant challenge for all enterprise organizations.
The CrowdStrike outage has caused huge public service and commercial disruption worldwide.
Many IT companies continue to invest heavily in providing support with their channel partners.
If enterprises are investing millions of pounds into their cyber protection armour and disaster recovery strategy, why are hackers still managing to profit from data disasters?
In Part Two, the author delves into three more key topics which are being talked about across the industry – AI operations (AIOps); rising energy costs and space constraints; and comparing the use of a single storage operating system versus multiple operating systems and invites readers to share their reaction and insights about these topics on Infinidat’s social media channels using the hashtag #InfinidatTalk.
There are innumerable theories about what good business leadership looks like. In good times, the momentum of strong revenues, solid profit margins, positive cash generation and thoughtful investment strategies for the future can hide a multitude of management flaws.
Applications and workloads all require storage, but with each requiring differing storage needs it fast becomes apparent that all enterprise storage is not all created equally. There’s high-end enterprise storage, mid-range storage, and entry-level storage, block, file, object, and hybrid cloud storage – they all behave and function differently as far as availability, cybersecurity, integration, performance, and connectivity to other software – namely, infrastructure software.
In an era where customer service is king, enterprises and service providers/hosting providers expect a higher level of pro-active customer experience, both in terms of service and support, and technical user experience. IT buyers want “easier, faster and better”.
Malicious actors with highly sophisticated hacking tools take data hostage and demand enormous
ransoms.
Research by the Enterprise Strategy Group into the relevance of environmental, social, and governance (ESG) programs in IT purchase decisions found that 93% of IT decision makers expect their suppliers’ ESG programs to have a major impact on their organization’s purchases.
Government bodies are now placing tighter compliance and cybersecurity requirements on business.
Cyber security experts have estimated that global cybercrime costs will exceed 7.5 trillion Euros this year .
Investing in payments is key for businesses to grow, yet many UK firms are still relying on slow, outdated processes.
World Backup Day has a clear, compelling message that is just as relevant and timely for enterprises today as it is for individual consumers: “Be prepared against data loss and data theft.”
Faced with ambitious Group-wide growth projections for expanding new handling capacity, including gateway and transhipment capabilities, the existing data storage system at Contship Italia was reaching its end-of-life stage.
It’s well-documented that the global IT skills gap not only exists, but it is also widening at a pace that has many CIOs, CTOs, CISOs and other IT hiring managers falling regrettably into a “fret it and can’t forget it” mindset.
Using Infinidat, basketball team, Detroit Pistons has consolidated their arrays to significantly reduce costs and improve system performance.
Infinidat helps German public administration organization Stadt Pforzheim switch to storage as a service in order to reduce capex costs.
Regardless of whether it is cybersecurity related, a data disaster recovery issue, dealing with the ever-growing IT skills gap, or adapting to new green IT and environmental, social, and governance (ESG) initiatives – all will mean that although organizations may need to rethink their costs, for those companies who leverage these trends they have the potential to unlock new value in creating an innovative enterprise.
Challenges on system performance, storage management, complexity and scalability continues to weigh heavily on many businesses.
Many organizations are looking back on 2023 to try and gain some insight into what the next 12 months could hold.
AI-powered technology to make more informed and intelligent sourcing decisions that optimizing costs, improving efficiency, and increasing speed-to-market, will help CFOs to unlock innovation across the organization.
Linking channel investment to individually prioritized business objectives ensures that channel growth aligns with the overall commercial strategy.
Today’s consumers demand Amazon-like digital banking experiences. DBA presents a compelling solution for banks seeking to enhance security and CX simultaneously by automating background verification.
Qualitative research highlights the importance of training and development in both attracting and retaining employees.
NIST is the National Institute of Standards and Technology at the U.S. Department of Commerce. The NIST Cybersecurity Framework helps businesses of all sizes better understand, manage, and reduce their cybersecurity risk and protect their networks and data.
The author discusses how one Fortune Global 500 enterprise needed to improve and accelerate its capabilities to backup critical enterprise data.
With the effects of the pandemic largely behind us, it was hoped that 2023 would bring calm and composure, but instead it has brought more turbulence.
In the ever-evolving landscape of enterprise data storage solutions, what truly sets a company apart is not just the technology it offers, but the way it serves its customers.
Today’s supply chains require data to be shared. But with the regulatory landscape having never been more complex, data and technology leaders must not only meet new compliance demands, but also rising expectations from their organization to use data to meet business goals.
Managing vast numbers of user identities across employees via Identity and Access Management (IAM) and customers is critical for operational, security and regulatory reasons.
The rapid transition into a more digital world means that IT teams now must look at their operations in a new light. Nearly all industries – including transportation, lodging, banking, retail, and entertainment – are being disrupted by digital-first entrants who are luring customers away from non-digital businesses.
Cybercrime is predicted to cost the world $8 trillion USD in 2023 alone.
Cyber criminals can infiltrate an enterprise infrastructure and stay there, undetected, for months at a time. When a data infrastructure does not have the right level of cyber storage resilience, intruders can take advantage of the value of data by accessing critical enterprise storage resources and unleashing ransomware and malware, among other types of cyberattacks.
As the digital economy grows, digital crime grows with it. All industries face greater exposure to cyberthreats due to increasing digitization, yet research shows that companies continue to lack the readiness to respond to ransomware attacks.
Earlier in the year cybersecurity circles were buzzing about Aikido Wiper, thediscovery of SafeBreach security researcher Or Yair.
No one would dispute that Information technology has become the backbone of commerce. As IT’s power and presence have expanded, companies have come to view it as a resource ever more critical to their success.
The widespread shifts to more flexible working that we saw take hold during the pandemic and prevail post-Covid have seen organizations shift their operating models and IT infrastructure to the cloud, paving the way for the browser to become one of the most critical business tools.
The utility sector is undergoing a huge transformation, becoming highly connected infrastructures, with millions of endpoints, including smart meters and smart grid devices.
Digital transformation efforts are driving enterprises to refresh and modernize their server, storage, and/or data protection infrastructure, and many are turning to storage systems equipped with solid-state storage to deliver the performance they need.
Improving storage performance and storage team productivity is paving the way for better agility, but with a huge skills shortage in IT compounded by budgets beingcut, IT management are being required to do more with less.
The introduction of the General Data Protection Regulation (GDPR) set the precedent for privacy and data laws around the world with 71% of countries now having data protection regulations in place and a further 9% with legislation in development.
In February 2022, Infinidat announced InfiniSafe®, its comprehensive cyber resilience1 architecture, which covers both primary and secondary storage, providing four pillars of protection.
Business and information technology leaders across the globe continue to seek to transform their organizations digitally.
International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets.
In the face of continuing economic uncertainty and a recession threat, every company is hyper-focused on cost management and financial performance.
Ego Pharmaceuticals reduces invoice processing time with Esker's Accounts Payable solution to improving supplier and employee experience.
Software is a fundamental value proposition of Infinidat’s portfolio.
As one of South Africa's leading cloud, connectivity, voice and security solutions provider, FirstNet turns to InfiniBox®, the powerful enterprise storage solution from Infinidat to help it deliver high performance, highly reliable storage with Capacity on Demand (COD) for all FirstNet customers.
Driven by a need to implement high end storage arrays for cloud, security, infrastructure, digital, data, management and web marketing, Cyllene needed an IT partner, but with no dedicated staff available to handle the administration of its storage network, Cyllene turned to InfiniBox®, the powerful enterprise storage solution from Infinidat.
Cybersecurity and cyber storage resilience are usually treated separately in the enterprise. This exposes a huge gap in creating a comprehensive enterprise cybersecurity strategy.
Forward thinking organizations across the UK are looking for practical ways to reign in their spending and mitigate the business impacts. One good option is to consider a switch to consumption-led pricing models for on-premises storage infrastructure, says the author of this article.
The IT skills gaps pose a ‘high or medium risk to their team’s ability to meet key objectives’ cites 80% of 80% of IT leaders according to the Skillsoft 2022 IT Skills & Salary. Where the requisite skills are available, workers are commanding premium rates and salary inflation is running at an all-time high.
As a leading provider in offering smarter ways to work with document-related solutions and services, solutions and services, Fujifim Business Innovation Corporation has now transformed its operations using Esker's accounts receivable solutions.
SME operations changed for good due to the COVID-19 pandemic, and as the modern office and workspace carries forward some elements of the hybrid working model that grew so popular during the height of the pandemic there are some fantastic real estate opportunities out there, explains the author of this article.
In this article, the author explores these issues and looks at how confusion around the meaning and potential of“automation”, “orchestration” and “XDR” may be a barrier to implementation.
We published our first ‘state of the nation’ Internet of Things (IoT) report in 2017. Last year, we revisited this study, surveying 300 UK and US IT decision makers within organizations across a range of industries, including utilities, energy, telecoms, construction and government, to see whether (and how) attitudes and adoption patterns have changed.
How rationalizing indirect spend is an area that, provided you have the right tools, is a perfect area for cost optimization.
In a world where cyber threats are varied (and constantly changing), cyber insurance can protect organizations from losses due to security incidents.
Looking ahead, 2023 will be a very exciting year for enterprise storage. In this article, the author looks at five emerging trends.
The rise of vendor guarantee programs is increasing, but if customers are going to use them to help make an enterprise storage purchase decision, it is important to really understand which program facets offer differentiating value.
To detect if a user has been stealing intellectual property, it’s no longer a case of physically borrowing that laptop.
Non-volatile Memory Express (NVMe), the new storage access and transport protocol for flash and next-generation solid-state drives (SSDs) is delivering the highest throughput and fastest response times yet for all types of enterprise workloads.
With the industry constantly pushing the message ‘Your business – safe at the speed of light’, many businesses are feeling overwhelmed.
Zero trust is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication – not assumed trust.
If you are at a supermarket, the “dirty dozen” is a list of foods that are considered the most tainted. Similarly, if you are working in an enterprise or for a service provider, the dirty dozen is a list of issues that tarnish IT infrastructure, “contaminating” current enterprise-grade implementations and exposing the dangers and risks associated with them
The general trend toward cloud-based IT and cloud-hosted applications use shows no signs of abating, and the life sciences industry – albeit behind the curve – has been making its own steady progress in moving its systems off premise.
The storage admin is no longer solely focused on storage, nor do they require PhD levels of storage expertise to do their jobs. Storage systems have evolved; new storage architectures have emerged, which fundamentally changed the storage landscape
How do you stop Cybercrime is the multi-billion dollar question. Every aspect of our IT infrastructures are part of it. The cyber “attack plane” is enormous, it is not just securing our network connections, but also extends to the people at their desks or at the edges of the company networks who can willingly or not, be the source of IT turmoil.
Digital transformation has been high on the agenda for most companies over the past few years – but there’s often too much inaction. This is preparing for failure, and that will come sooner than many might think.
The ability to use data is becoming essential to governing well. With digital technologies having transformed our economy, society and daily lives, the challenge for governments is to make use of new sources of data and the emergence of new data science technologies to solve problems and make decisions.
The threat of cyberattacks has become such a huge issue facing the largest global enterprises that 66% of Fortune 500 CEOs named it the Number One threat to businesses in the May 2021 survey of Fortune 500 CEOs.
Just as employees are being rallied by the Government to return to the workplaces and adapt to the new ‘norm’ of living with the Covid Omicron virus, it is feared that safety concerns around social distancing could push commuters away from trains despite the green agenda.
Data protection is one of the most important safeguards that a company can have today.
As 2022 gets under way and the new financial year looms, many companies are starting to identify the key strategic focus areas for the year ahead and the technology investments needed to deliver them.
As data and mobility become more critical to business operations, IT teams across the globe are getting ready to embrace the next-gen network. In this article the author discusses the benefits that fifth generation wireless technology (5G) can bring to businesses.
Knowledge Graphs are a big trend in the advanced data science world, but they aren’t as widely known as they could be.
Data protection has many meanings. It ranges from the data availability on primary storage, to the long-term preservation and retention of data for multiple business purposes.
Despite the ASC 606 and IFRS 15 standards deadlines of 2017 and 2018 respectively, many public and privately held companies are still not compliant.
Open banking is enabling new ways for people to manage their money.
With synthetic identity fraud on the rise, behavioural biometrics enable banks to balance customer experience and fraud prevention.
For many years, IT teams have struggled to manage several different data storage systems. Bringing together a range of silo systems into a frictionless ecosystem is often surrounded in complexity, whilst spiralling costs as vendors try to collaborate is frustrating.
With showrooms throughout Somerset, FJ Chalke continues to grow, but like most businesses that experience rapid growth, the challenges of managing increased amounts of paperwork become a much larger task. With help from YourDMS (www.yourdms.net), FJ Chalke are transforming its operations.
Data centres account for 1% of the world's total electricity usage each year, and by 2030 this is set to rise to around 3-13% with much of the power going into cooling servers and systems according to research conducted by Huawei Technologies.
Higher education and research organizations faced with challenges for urgent digitization of their applications and data platforms, are now moving their IT infrastructure off-campus and into a purpose build data centre to ensure that their IT works harder for less.
As a marketplace entrepreneur, you want to build your marketplace with the best possible chance of success by putting a robust strategy in place and look at how others have used these platforms to their competitive advantage.
In this last year, we have seen an exponential growth in not just the amount of digital data, but also its vulnerability.
US data privacy at a glance
Data privacy protection is both a fundamental right and an economic need, as data breaches grow in impact and frequency.
With 2020 dominated by the start of the COVID-19 pandemic, there was also a sharp rise in cybercriminal activity. From simple phishing attacks to one of the largest DDoS attacks ever recorded, we saw the cyber threat landscape evolve and grow.
For as long as there has been competition among IT vendors, IT vendors have bragged about the performance of their products. Too often vendors toss around the word performance as if it were some simple, one-dimensional thing.
New research from Team Nautilus revealing that a significant majority of companies that move to multi-cloud environments are not properly configuring their cloud based services.
In a world driven by connections, graph algorithms provide one of the most potent approaches to analyzing connected data because they are specifically built to operate on relationships.
As CEOs look to transform their enterprises and drive new business models forward to thrive in the digital economy, addressing business process management issues has never been more critical.
While there are no enterprise storage systems other than InfiniBox that claim to use DL (and none do), there are many that claim to use AI/ML.
When it comes to marketing storage products, IT vendors often misuse the terms Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL).
Spotify Web Player has recently patented a voice recognition technology that is capable of tailoring bespoke music recommendations to our emotions and environment. With the help of Artificial Intelligence, could this new music technology become another powerful tool for advertisers and tech giants to target us more effectively? Asks Tom Andrews at Rightly.
Credential phishing attacks
In the last month, the Menlo Labs team has been observing a steady rise in credential phishing attacks. Credential phishing is a popular method of attack where attackers make use of fake login pages or forms to steal credentials of commonly used services in a corporate environment.