Category Archives: Cloud Storage

Excessive Cloud Spending is Proving to be a Problem for Half of Businesses – Digital Information World

Data storage methods have advanced to the point where cloud technology is rapidly turning into the global standard, but in spite of the fact that this is the case it appears that many businesses are struggling with the expenses that cloud migration can incur. Rising volatility in the economy is making things worse because of the fact that this is the sort of thing that could potentially end up making cloud data storage requirements hard to predict with any degree of certainty.

According to this report that was just put out by Anodot, just under half of businesses, or 49% to be precise, are having a hard time managing their cloud spending. With all of that having been said and now out of the way, it is important to note that cloud waste is cited as a major factor in excessive spending by 54% of businesses that participated in this survey. Additionally, 44% of top level executives opined that their companies waste about a third of their cloud budgets for the year.

Cloud architecture that uses a multitude of tools to manage the environment are also causing wastage according to 59% of respondents. Furthermore, 73% stated that their organizations are increasing cloud capacity which can make decisions harder in the long run.

Cloud computing can be revolutionary, but low levels of clarity are impeding this techs ability to improve data storage for organizations. Ad hoc implementation is a huge source of concern, and more work needs to be done to streamline the industry and create a consensus regarding the best practices.

Read next:Enforcing Data Privacy Can Increase Revenues According to This Survey

Read the original:
Excessive Cloud Spending is Proving to be a Problem for Half of Businesses - Digital Information World

This is Not Your Fathers VPN – Security Boulevard

To many, VPNs seem unremarkable and havent changed much in the past decade. A VPN is a VPN is a VPN. Some even think that VPNs are hardly necessary with the rise of building encryption directly into email, browsers, applications and cloud storage. The reality is thatespecially for small and medium businesses (SMBs)VPNs are still vital; they can and should take on additional responsibilities to meet the challenges of a largely remote workforce and the increasing amount of IT resources and infrastructure residing in the public cloud.

In todays challenging and ever-changing environment, modern VPNs are less about point-to-point encrypted tunnels and more about enabling a new kind of networking to secure employees and other users, regardless of where they are located, and protecting cloud-hosted resources, ranging from SaaS applications and services to storage. In essence, this represents a shift to a cloud VPN that ensures secure access and provides necessary controls while also enabling agility and scalability. The internet is the network, but a cloud VPN is a secure, virtual, private network within it.

For many companies, the idea of a traditional corporate network is long gone. Even enterprises with sizable physical offices may no longer offer anything resembling a local area or wide area network. Most simply have internet access points. Even peripherals, such as printers, may be connected directly to the internet. Some companies have most or all of their employees working remotely and, for them, the network is comprised of each individuals internet connection. Some companies no longer have physical office locations at all and, instead, rely on shared workspace locations as needed. Again, the network is wherever these might be. At the same time, for a growing list of companies, all systems, applications and storage are in the public cloud.

The new cloud reality calls for a rethinking of VPNs that shifts from connections from discrete pointsoffices, private data centers and remote access VPNsto new cloud networks tailored to each organization that encompass all access points and all resources. Such cloud VPNs also leave hardware behind, including expensive and complex MPLS, and are fully cloud-delivered. Similarly, they are not an add-on to endpoint computer security suites or corporate firewalls. They can be fully automated and far easier to set up and maintain.

Despite providing scale and flexibility, these new cloud VPNs can improve the level of security much more than in past generations. One way is through the use of static IP addresses. IP addresses should mainly be static to provide deterministic knowledge of who is going where, enabling necessary access controls and logging or audit trails. Previously, fixed IP addresses were considered to limit flexibility and cause expense, but now, as cloud-delivered capabilities, fixed IP addresses can be implemented quickly, affordably and at scale.

Having fixed IP addresses is also important for providing identity-based access controls and creating zero-trust type environments. Zero-trust has been difficult for most SMBs to achieve due to its complexity and the time and cost required to create and maintain it. Through a cloud VPN, zero-trust network access can be implemented at the application and network layers rather than having to depend on gateway-based architectures or microsegmentation. Conditional access and rules can be implemented and high levels of authentication and authorization maintained. Proper logging enables compliance with stringent regulations, such as GDPR or U.S. state-specific laws and to achieve necessary certifications, such as SOC 2. A cloud VPN could provide the means for verification, concealment, monitoring and containmentall four aspects of zero-trust network access.

Another important element to consider is the use of a cloud VPN as the means to implement a software-defined perimeter that can hide and protect all traffic within it. Rather than just simple point-to-point tunneling, the cloud VPN provides a virtualized, encrypted network to connect all users to systems, data and resources with new levels of determinism, trust and control. In some cases, some specific cloud resources or systems may be whitelisted to enable additional security or access controls with rules or policies. IP whitelisting can significantly reduce the attack surface and risk associated with unauthorized access, particularly when users have static IP addresses. In this case, a cloud VPN can take on the centralized role for IP whitelisting, removing it from specific hardwaresuch as firewalls, edge routers or serversor from each application. IP whitelisting can also provide better security and control of IoT devices.

The notion of a VPN being outdated, table stakes or no longer needed is based on an outdated view of what VPNs were in the past. New cloud VPNs are built on legacy technology to help organizations embrace new challenges while providing the economics, agility and scale of the cloud. Cloud VPNs are not at all your fathers VPN but the means for manyespecially SMBsto advance their security, compliance and infrastructure agility.

Recent Articles By Author

See the article here:
This is Not Your Fathers VPN - Security Boulevard

Hackers may have breached medical billing records of nearly 1 million CNY patients – syracuse.com

Syracuse, N.Y. -- The medical billing records of nearly 1 million Central New York patients may have been obtained by hackers.

Practice Resources LLC, a company that provides billing services for dozens of hospitals and medical providers, said hackers may have obtained names, home address, dates of treatment and internal account numbers of more than 924,000 patients.

No private medical information, credit card numbers or Social Security numbers were exposed, said David Barletta, chief executive officer of Practice Resources. Practice Resources required public notice said there was no evidence that information was misused as a result of this incident. The company is providing for free a year of online cybersecurity protection for all affected patients.

Practice Resources bills about $450 million annually for its clients, Barletta said. The data breach affected the records of patients of at least 28 Central New York medical providers, including bedrock institutions like St. Josephs, Crouse and Upstate Community hospitals; the Salvation Army; and the sprawling Family Care Medical Group. (See full list below.)

The breach also includes billing records of physical therapists, pediatricians, gynecologists and orthopedic surgeons.

Family Care Medical Group lost all of its laboratory data and had to shut down its lab for months while rebuilding the computer system, said the groups chief executive officer, Dr. Mitchell Brodey. Lab work was sent to another laboratory in the meantime.

We just reopened a week ago, Brodey said.

Family Care is owned by the same doctors group that owns Practice Resources.

The billing company was hit by a ransomware attack in April, and it took months to determine which patient accounts had been accessed. In a ransomware attack, hackers lock down or hide information in a computer system and demand a ransom to release it.

Barletta said he could not say whether Practice Resources paid a ransom to free the data.

Due to the ongoing investigation, were not allowed to discuss that, he said.

Barletta said Practice Resources hired a forensic team to scout patient data and see what might have been taken.

There was no evidence that any patient information was accessed, including Social Security numbers, he said.

Barletta said the state Attorney Generals office is investigating the hacking and whether Practice Resources data security was adequate. Wegmans supermarket chain was recently fined $400,000 by the attorney generals office for lax cloud storage that exposed the data of more than 3 million customers.

The Practice Resources breach happened April 12, but patients are just now receiving letters. Barletta said the forensic investigation was time-consuming, and figuring out which patients accounts had been hacked, and contacting each medical practice, took months.

If you havent received a letter but think your data might be at risk, you can call 1-866-667-1465, from 8 a.m. to 8 p.m. weekdays.

The Syracuse City School District and Onondaga County Public Library were hit by ransomware attacks in 2019. It took weeks to restore the systems.

Heres the list of medical providers whose patients records might have been affected by the Practice Resources breach:

Achieve Physical Therapy, PC

CNY Obstetrics and Gynecology, P.C.

Community Memorial Hospital, Inc

Crouse Health Hospital, Inc

Crouse Medical Practice PLLC

Family Care Medical Group, PC

Fitness Forum Physical Therapy, PC

FLH Medical PC

Guidone Physical Therapy, PC

Hamilton Orthopedic Surgery & Sports Medicine

Helendale Dermatological and Medical Spa, PLLC

Kudos Medical, PLLC

Laboratory Alliance of Central New York, LLC

Liverpool Physical Therapy, PC

Michael J Paciorek, MD PC

Nephrology Associates of Watertown, PC

Nephrology Hypertension Associates of CNY, PC

Orthopedics East, PC

Salvation Army

Soldiers & Sailors Memorial HospitalPhysician Practices

St. Josephs Medical

Surgical Care West, PLLC

Syracuse Endoscopy Associates, LLC

Syracuse Gastroenterological Associates, PC

Syracuse Pediatrics

Tully Physical Therapy

Upstate Community Medical, PC

See the original post here:
Hackers may have breached medical billing records of nearly 1 million CNY patients - syracuse.com

6 Alternative Authentication Methods For Your Online Customers – Security Boulevard

Many marketing campaigns focus on ways to engage customers and make them stick around. But theres a thing lurking behind cyber criminals.

With the rise of eCommerce, crypto wallets, and the time people have to spend on the internet, its more important than ever for businesses to focus on security. One way to do this is by implementing foolproof authentication methods for online customers.

Providing alternative authentication methods will not only make your site more secure but will also give your customers peace of mind knowing that their information is well-protected.

This blog will break down popular authentication methods to consider.

Before we get into the nitty-gritty details, its crucial to understand why you should start offering alternative authentication methods in the first place. Here are some reasons why you should consider implementing them:

Passwords are indeed the most common means of user authentication. But, now the technology has progressed to a point where passwords are no longer considered the safest option.

They have become quite easy to crack and are often the weak link in an otherwise strong security system.

A recent study by Juniper Research found that cybercriminals will steal 33 billion records in 2023 alone. Clearly, data breaches are becoming more and more common, and theyre also becoming more expensive.

Fraudsters could reach as high as $68 billion globally in 2022. This is a huge problem that businesses need to be aware of so that they can earn digital trust.

Alternative authentication methods can help prevent fraud by deterring malicious actors and making it more difficult for them to access sensitive information.

If youre in a regulated industry, then you likely already know that you need to comply with certain security standards. For example, the Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements for businesses that process, store, or transmit credit card information.

Similarly, the Health Insurance Portability and Accountability Act (HIPAA) is a set of regulations for businesses that handle protected health information (PHI). If youre in the healthcare industry, then you need to take steps to ensure that your systems are HIPAA-compliant.

While alternative authentication methods may not be required by these regulations, they can certainly help you comply with them.

Now that weve established the importance of offering alternative authentication methods, lets take a look at some of the most popular options.

One of the most common and effective authentication methods is multi-factor authentication (MFA).

MFA essentially adds an extra layer of security by requiring users to provide more than one piece of evidence, or factor, to verify their identity.

This could include a password, as well as a code thats sent to the users mobile phone or email address.

Another popular authentication method is SMS-based authentication, which uses text messages to verify a users identity. This type of authentication is often used in conjunction with other methods, such as MFA.

Biometric authentication is another great option for businesses looking to add an extra layer of security.

This type of authentication uses physical or behavioral characteristics, such as a fingerprint, face, or iris scan, to verify a users identity.

Mobile tokens are another effective authentication method that uses a physical device, such as a phone, to generate a one-time code thats used for logging in to an account.

This type of authentication is often used by businesses that require a high level of security, such as banks, eCommerce sites, and cloud storage providers.

Social authentication is a relatively new method of authentication that uses social media platforms, such as Facebook and Twitter to verify a users identity.

So, when you see the option to log in with Facebook on a website, thats social authentication in action. Just like SMS-based authentication, social authentication is also often used in conjunction with other methods, such as MFA.

Compared to other authentication methods, FIDO authentication is a bit more technical. It uses public-key cryptography to verify a users identity and doesnt require the use of passwords. Instead, users authenticate themselves using a physical device, such as a USB key or security token.

What the user needs to do is simply plug the device into their computer and enter their PIN. This type of authentication is more secure than traditional passwords and is quickly becoming the new standard in user authentication.

Now that youre familiar with some of the most popular alternative authentication methods, its time to decide which one is right for your business.

The best way to do this is to consider your businesss needs and objectives. For example, if youre looking for a more secure authentication method, you might want to consider MFA, biometric authentication, or FIDO authentication.

On the other hand, if youre looking for a simpler and more user-friendly authentication method, SMS-based authentication or social authentication might be a better fit.

Ultimately, the decision comes down to what you feel is best for your business. Whichever authentication method you choose, just make sure its one that will give your customers the peace of mind and security they deserve.

Its also important to keep in mind that no single authentication method is perfect. The best way to keep your site secure is to use a combination of methods. This will make it more difficult for hackers to gain access to your site and ensure that your customers data is safe.

Go here to see the original:
6 Alternative Authentication Methods For Your Online Customers - Security Boulevard

SVG PLAY: How On-Prem, the Cloud, and Growing File Sizes Are Impacting Storage and Archive Planning for Sports-Media Companies – Sports Video Group

A panel of leaders from the NBA, MLB, NHL, Imagen, and Data Core discuss striking a balance

For the first time since prior to the COVID-19 outbreak, theSVG Sports Content Management Forumreturned to New York City. Hosted at The Westin New York at Times Square on July 27, the event brought together technological leaders from various networks and vendors for a day of networking, information exchange, and idea sharing all around topics like storage, archiving, metadata, and more.

Sports leagues, broadcasters, and content producers of all sizes are challenged with The Big Archive Question: Where do I store my stuff? And, with more content being created every single year and file sizes continuing to grow with the arrival of 4K and HDR, this question has never been bigger.

In this panel discussion from the 2022 SVG Sports Content Management Forum, technology leaders and content owners discuss finding a happy medium between on-premises and the cloud, file-format and codec considerations, retention policies and the question of keeping/discarding physical tapes, and much more.

Panelists:Tom Blake, Imagen, Commercial DirectorAlex Grossman, DataCore, VP, Product Management and Product MarketingChris Halton, NBA, SVP, Media Technology and Operations*Adam Japhet, Major League Baseball, Senior Director of Corporate InfrastructureGrant Nodine, NHL, SVP, TechnologyModerator:Tab Butler, SVG Sports Content Management Committee, Former Chairman

*since the recording of this panel, Chris Halton announced that he has stepped down from his position at NBA.

SVG PLAYis your new home for all Sports Video Group live event and long-form video content. As an SVG member and sponsor, receive simple access to all SVG event panels, case studies, keynotes, and more all in one place. To visitSVG PLAY,CLICK HERE.

See the article here:
SVG PLAY: How On-Prem, the Cloud, and Growing File Sizes Are Impacting Storage and Archive Planning for Sports-Media Companies - Sports Video Group

These Three Coins Will Make Your Crypto Winter Very Mild: Pugglit Inu, Ethereum, and Filecoin – NewsBTC

Cryptocurrency markets, where investment trends are positive, continue to offer numerous opportunities that will bring profitability in the long run. Drawing attention to a very productive process, coin investors emphasize that the appreciation of altcoins will be high during this period.

Along with altcoins, it can be seen that projects that are in the development stage are also attracting attention. Pugglit Inu (PUGT) is shown as one of the thriving ecosystems developed during this period.

Pugglit Inu (PUGT) is stated as a meme coin project. Developed on the Binance Smart Chain, the ecosystem provides low-cost transfers using multi and cross-chain technologies. Likewise, it is stated that the transaction speeds in the ecosystem are kept at the highest level.

Pugglit Inu (PUGT), a comprehensive marketing program, plans to reach large audiences by actively using social media platforms. To be profitable in the long term, the ecosystem, which is stated to be continuously expanded, has already met with intense interest from traders.

Pugglit Inu (PUGT) offers a chance to earn passive income and participate in decentralized management through its staking program. It is emphasized that the staking program could offer high profitability for users.

Ethereum (ETH) is the primary native asset of the Ethereum platform. This token was created to incentivize programmers running the Ethereum protocol on their computers. Developers are rewarded with this digital asset. In this way, the network remains secure at all times.

Mining operations need to be done to produce Ethereum (ETH), just like Bitcoin. Ethereum miners use computers or special hardware for this process. GPUs (video cards) or ASIC chips are used in mining operations.

Mining is a system in which users are rewarded by solving cryptographic passwords through various devices. In this, the computational power of the machines we mentioned above is used. For this reason, Ethereum (ETH) is a good choice both as an investment tool and for users who want to mine.

Filecoin (FIL) is a decentralized storage network. It turns cloud storage into an algorithmic market. The market runs on a blockchain with a native protocol token (called FIL) and lets participants earn rewards for supplying storage to clients.

Filecoin (FIL) was founded by Protocol Labs, which also created libp2p and IPFS. The Filecoin (FIL) network achieves its purpose by allowing clients to pay providers for storing or retrieving data. In this way, it provides an economic incentive for miners anyone with spare storage space to join the network and contribute their resources.

It results in a more decentralized, secure, and censorship-resistant storage infrastructure than what is offered by traditional cloud providers such as Amazon S3 or Azure Storage.

The Bear Market has taken its toll on the prices of many cryptocurrencies, but there are still a few gems to be found. In this article, weve highlighted three coins that we believe will outperform the market in the long run: Pugglit Inu (PUGT), Ethereum (ETH), and Filecoin (FIL).

While no trade is without risk, we believe these coins could offer good potential for returns despite the current market conditions.

Disclaimer:This is a paid release. The statements, views and opinions expressed in this column are solely those of the content provider and do not necessarily represent those of NewsBTC. NewsBTC does not guarantee the accuracy or timeliness of information available in such content. Do your research and invest at your own risk.

More here:
These Three Coins Will Make Your Crypto Winter Very Mild: Pugglit Inu, Ethereum, and Filecoin - NewsBTC

Does mission critical data mean taking things slow? Nah, let’s take it to the Max Blocks and Files – Blocks and Files

Sponsored Feature Were used to hearing how data is the secret to unlocking your organizations potential, if only youre brave enough to let it flow freely.

The problem is that experienced tech leaders and data specialists in large organizations are likely to be far less cavalier about letting financial, credit or medical data just flow. As Dell engineering technologist Scott Delandy explains, Theyre relatively risk averse, just by the nature of the types of applications that they run.

The mission critical data systems underpinning these applications have been built up over years, decades even, with a sharp focus on quality, stability and reliability, he says, because You always expect your credit card to work. You always expect the thing that you bought to ship and usually get there on time. And you expect to walk out of the hospital.

At the same time, these organizations know that they do need to run new workloads, pouring their data into AI for example, or building out new, more agile but still critical applications on containers and microservices rather than traditional monoliths.

Now, as theyre being asked to support next generation workloads, they dont want to have to rebuild everything from scratch, says Delandy. They want to take the existing infrastructure, [or just] the operational models that they have in place, and they want to be able to extend those to these new workloads.

Containerized OS

These were the challenges Dell had in mind when it began to plan the refresh of its PowerMax line, the latest in a series of flagship storage systems which is at the heart of tech infrastructure in the vast majority of Fortune 500 companies. The most recent update introduces two new appliances, the 2500 and the 8500, which feature new Intel Xeon Scalable CPUs, NVMe dynamic fabric technology, and 100Gb Infiniband support, as well as a new storage operating system, PowerMaxOS 10.

Given the focus on containerized applications, it shouldnt be a surprise that the new OS is containerized itself, making it easier for Dell to develop and launch new features, and to share them across both PowerMax and the vendors other storage platforms.

Because of the way the microcode, the software, the operating environment has been developed, that gives us the ability to cross pollinate data services between the different platforms, says Delandy. One example of this cross pollination is a new set of file capabilities, which first appeared on the PowerStore platform, and is now also available on PowerMax.

But users still face the challenge of how to straddle the traditional VM world and modern applications built around containers an architecture that was never even built with persistent storage in mind and access the same automated, low touch, invisible type of workflow.

And thats why a lot of the work that weve been doing [is] around integrating to things like CSI (container storage interface), he explains, By putting a level of automation between the CSI API and the automation that we have on the infrastructure.

This is based on Dells Container Storage Modules technology, which is the connection between the CSI APIs and the infrastructure APIs, and it allows you to do all of those higher level things around replication, visibility, provisioning, reporting.

This is a key example of Taking the things that people have already built for and have had in place for decades and saying, Okay, Im just gonna go ahead and plug these new workloads in.

It also allows for active-active Metro replication for both VM and containerized applications, even though CSI block data is managed very differently to VM block data, Delandy explains. Weve been doing that in the VM world for like 100 years, right?

Radical density

The software improvements combine with the hardware improvements to enable what Delandy describes as radical density, offering more effective capacity with less physical storage, to the tune of 4PB of effective capacity in a 5U enclosure, or 800TB of effective storage per rack unit.

One significant contributor to this is the ability to support higher density flash, while also supporting very granular capacity upgrades.

Key to this is Flexible Raid which allows single drives to be added to a pre-existing RAID group. This means, When we put an initial configuration onto a users floor, we can use very dense flash technology, because we know if we start off with 15 terabyte drives, well see 30 terabyte drives in the next release. We know that when the customer needs to upgrade, we can just add another 15 terabytes versus having to add 150 terabytes.

Further flexibility comes courtesy of Dells Advanced Dynamic Media Enclosure technology which decouples the compute and storage elements of the PowerMax appliance. This allows more options on the balance of compute nodes versus storage capacity, as well as scalability. It also heads off the dilemma users face when an array starts topping out on performance, but because they have no way to upgrade the controllers, they are forced to add another entire array.

But even with the improvements that have led to this radical density, the remorseless growth of data means that admins still have to consider just how much they want to keep on their premium storage platforms. PowerMax has had multi cloud capabilities since its previous generation of appliances, with the ability to be able to connect in and copy and move data between primary block stores on site to an S3 object store. That can either be a private object store, like in the Dell World, it could be a PowerScale, or it could be an ECS platform. Or it could be a cloud provider.

The latest generation, Delandy continues, brings higher performance, resiliency, and high availability. But also, he says, a better understanding of the use cases. For example, analysis of users arrays suggests up to a quarter of capacity is taken up with snapshot data. There are perfectly good reasons why companies want to keep snapshots, but it also makes perfectly good sense to move them off the primary storage and into the cloud, for example.

Now you can run more transactional databases, more VMs, more Oracle, more SQL, more applications that need the throughput and the processing power of the array versus just holding all this stale, static data.

Its big, but is it secure?

Whether the data is transactional or static, security is the number one thing that users want to talk about these days, Delandy says. Often the conversation is simply a question of highlighting to users the pre-existing features in the system: Its really helping them understand what things they can do and what types of protection they already have, and how to enable what are the best practices around the security settings for that.

But the biggest concern customers have is somebody getting into the environment and not finding out fast enough that youve been breached.

Two new features are crucial here. One is the inclusion of hardware root of trust, which sees cryptographic keys fused onto the controller chips. Everything then has to be authenticated against these, from boot ups to upgrades and driver updates. This significantly reduces the risk of a bad actor obtaining backdoor access to the systems.

In addition, PowerMax now uses anomaly detection to monitor the storage and detect changes to the types of datasets being written including any failure to meet the 4:1 data reduction rates the systems updated reduction algorithms can deliver. One of the things that we look at is whats the reducible versus non reducible rate, and how does that change. We have it set to be so sensitive, that if we start to see changes in reducibility rates, that can indicate that something is being encrypted, explains Delandy.

Its a huge advantage for customers if they can get an indication of ransomware being at work within minutes, because typically encryption due to ransomware takes days, weeks, or even months.The ability to introduce automation, and balance both the long and short term view, is crucial to the whole PowerMax ethos. Dell has sought to take what was already a highly reliable platform and make it simultaneously a highly flexible platform on which it can deliver rapid innovation.

But as Delandy says, Dell has to ensure it is taking a deliberate, targeted approach to actually solving customer problems. Or, put another way, Were not just doing it because its cool.

Sponsored by Dell.

Read the original here:
Does mission critical data mean taking things slow? Nah, let's take it to the Max Blocks and Files - Blocks and Files

USD 6.03 billion Growth in Data Loss Prevention Market with Accelerating CAGR of 23.78% – Growing Use Of Cloud For Data Storage to Boost Market Growth…

For insights on the scope and value chain analysis, Read Sample Report

Key Market Dynamics:

More Key Market Dynamics and their Impact Analysis is now available at Technavio, Request for Sample Now!

Market Segmentation Insights

The data loss prevention market report is segmented by Deployment (Cloud-based and On-premise) and Geography (North America, Europe, APAC, South America, and Middle East and Africa).

View our sample reportfor additional insights into the contribution of all the segmentsand regional opportunities

Some Companies Mentioned with their Offerings

Related Reports:

Data Protection and Recovery Software Marketby End-user and Geography - Forecast and Analysis 2022-2026

Data Protection as a Service Market by Application and Geography - Forecast and Analysis 2021-2025

Data Loss Prevention Market Scope

Report Coverage

Details

Page number

120

Base year

2021

Forecast period

2022-2026

Growth momentum & CAGR

Accelerate at a CAGR of 23.78%

Market growth 2022-2026

$ 6.03 billion

Market structure

Fragmented

YoY growth (%)

22.31

Regional analysis

North America, Europe, APAC, South America, and Middle East and Africa

Performing market contribution

North America at 40%

Key consumer countries

US, Japan, Germany, France, and UK

Competitive landscape

Leading companies, competitive strategies, consumer engagement scope

Companies profiled

Acronis International GmbH, Broadcom Inc., Check Point Software Technologies Ltd., CoSoSys Srl, Dell Technologies Inc., Digital Guardian Inc., Forcepoint LLC, GTB Technologies Inc., HelpSystems LLC, InfoWatch, Jive Software, McAfee Corp., Open Text Corp., Proofpoint Inc., SearchInform Ltd., Somansa Technologies Inc., Spirion LLC, Trend Micro Inc., Trustwave Holdings Inc., and Zecurion Inc.

Market Dynamics

Parent market analysis, Market growth inducers and obstacles, Fast-growing and slow-growing segment analysis, COVID 19 impact and future consumer dynamics, and market condition analysis for the forecast period.

Customization purview

If our report has not included the data that you are looking for, you can reach out to our analysts and get segments customized.

Key Topics Covered:

About Us

Technavio is a leading global technology research and advisory company. Their research and analysis focus on emerging market trends and provide actionable insights to help businesses identify market opportunities and develop effective strategies to optimize their market positions.

With over 500 specialized analysts, Technavio's report library consists of more than 17,000 reports and counting, covering 800 technologies, spanning 50 countries. Their client base consists of enterprises of all sizes, including more than 100 Fortune 500 companies. This growing client base relies on Technavio's comprehensive coverage, extensive research, and actionable market insights to identify opportunities in existing and potential markets and assess their competitive positions within changing market scenarios.

Contact

Technavio ResearchJesse MaidaMedia & Marketing ExecutiveUS: +1 844 364 1100UK: +44 203 893 3200Email:[emailprotected]Website:www.technavio.com/

SOURCE Technavio

More here:
USD 6.03 billion Growth in Data Loss Prevention Market with Accelerating CAGR of 23.78% - Growing Use Of Cloud For Data Storage to Boost Market Growth...

Does the Samsung Galaxy Z Fold 4 have an SD card slot? – Digital Trends

Expandable storage is decidedly pass on smartphones, especially premium ones. You used to be able to make do with a 64GB smartphone and slap a 1TB memory card in it to hold all your media and apps. That no longer happens. Once a staple on Samsung phones, the company no longer allows users to expand their built-in storage with microSD cards. The Galaxy Z Fold 4, despite being a little tablet like the microSD card slot-toting Galaxy Tab S8 Plus, is no exception.

Only internal storage of 256 or 512 GB is supported by the Galaxy Z Fold4; microSD cards are not supported, Samsung says. A 1TB model, exclusive to Samsungs web store in select countries, also exists. With this in mind, what should you do about it?

As noted above, Samsung offers 256GB to 512GB storage options for the Galaxy Z Fold 4. Theres an exclusive 1TB model, but thats not going to be available anywhere. The advice for that variant would be simple anyway: If you can afford it and buy it, it will hold everything you want.

The 256GB and 512GB models are both fairly large. They will be able to store a large number of ever-growing Android apps, tens of thousands of photos, and a hundred or two hours of HD video (depending on which model) over the course of three or so years. While the base 256GB model should be enough for just about anyone, the 512GB model is for those who ultimately want peace of mind. Itll likely hold everything, and youll probably never have to worry about your storage.

With the Galaxy Z Fold 4 going up to 1TB, there are pretty much no alternatives on the market. There are rivals from Oppo and Xiaomi in Chinese markets, but those dont make their way across borders, nor do they have microSD card slots. Foldables are fragile enough already with many moving parts and the disadvantages of microSD cards that well discuss shortly. Putting it simply, if you want to be comfortable with your Galaxy Z Fold 4s storage, you have no choice but to buy the biggest you can.

Theres a reason manufacturers stopped including support for microSD cards, and thats because Google made it increasingly difficult to use them before landing on a sort of sweet spot (and weve gone through that present situation here). You see, people didnt use microSD cards just for media; they were used to store apps and app data as well. However, not all microSD cards are created equal. A slower microSD card would end up degrading the experience of your device, possibly causing apps to lag and crash. Additionally, when a microSD card fails, you could lose data and disrupt your app experience, and more. A more expensive memory card could solve some but not all of these issues.

Furthermore, microSD cards were useful when we didnt have both capacious internal storage amounts and cheap cloud storage. Its one thing when you only have 16GB to play with and no memory card. Its another thing entirely you can have up to a terabyte of storage, combining both local and cloud storage.

See original here:
Does the Samsung Galaxy Z Fold 4 have an SD card slot? - Digital Trends

Things To Keep In Mind While Starting An SME In 2023 – Startup.info

Starting a business with a plan helps you stay focused on the objectives essential for success. In addition, putting your intentions on paper might help you clarify your goals and priorities.

A 12-month cash flow estimate, a profit and loss projection, and a two- or three-year projection are typically included in business plans.

With the extremely volatile modern market, you need to consider certain crucial factors before starting a business in 2023.

Given below are the important factors that you need to keep in mind when planning a business in 2023

Planning your finances for the upcoming year may assist you in allocating resources efficiently, making wise financial decisions, and prioritizing expenses.

Explore the different emerging fintech to implement in your business. For example, Cryptocurrencies are one of the latest trends in the financial sector. With emerging Crypto exchange platforms likebitcoin billionaire, you can easily exchange and trade digital assets online.

Innovation, profit, employee retention, and customer pleasure are all fueled by a dedication to business growth. 26 percent of small business owners who were unsuccessful in getting a loan eventually decided against growing their company because they lacked the funds.

Given below are some critical financial factors to be observed

Companies are being forced to respond to digital transformation by the pandemic, the associated required lockdowns, and changes in consumer and market needs.

Here are some of the most important developments in technology that needs to be kept in mind while starting a business

Integrating cloud-based solutions and the Internet of Things (IoT) into your daily life will be easier and less expensive, thanks to 5G.

Businesses will consider the type of adoption as cloud computing is subjected to a more thorough examination. Since 2020, more software vendors have included multi-cloud integration options. Amazon Web Service (AWS), Microsoft Azure, IBM, Google, and Alibaba round up the top five providers.

Its openness offers an impenetrable security barrier that may alter how financial transactions are carried out. It also has food safety, intellectual property and real estate management applications.

Many businesses are investing in creating methods for processing massive amounts of data. According to McKinseys World Business Report, services, infrastructures, and applications that may accelerate data processing would incorporate machine learning (ML) and artificial intelligence (AIt.

Edge computing will be required for autonomous vehicles, smart cities, and other things, as well as the internet-of-things (IoT) market. For example, Zion Market Research projects that the global market for IoT healthcare will be worth $140 billion by 2024.

Infrastructure that is up to date, effective, and improves connection and competitiveness transforms economies. For many smaller businesses, infrastructures ability to shift has leveled the playing field.

In the Asia Pacific, SMEs make up more than 98 percent of all companies, and they rely on contemporary supply chains and scalable infrastructure to sell and compete on a global scale.

Infrastructure in the 2023 future market will completely shift to the digital space. Hence, if you want to start your business in the coming year, you need to create a strong hold on this space.

Infrastructural factors that would empower your SME are as follows

Although there is no such thing as knowing too much about your industry, many business owners often know too little. A business plan is the first thing I suggest you create, and Ive shown you how to do it here. Hopefully you can take some inspiration from it and assess if your intuition was accurate and whether the venture is viable or not.

Go here to see the original:
Things To Keep In Mind While Starting An SME In 2023 - Startup.info