Month: April 2016

User identity and access management: New data security perimeters

The types of control security personnel can maintain over their data centers are changing. As more companies embrace cloud and mobile infrastructures, areas that cause IT teams to relinquish some level of control, security pros …

The post User identity and access management: New data security perimeters appeared first on DataGravity Blog.

User identity and access management: New data security perimeters

The types of control security personnel can maintain over their data centers are changing. As more companies embrace cloud and mobile infrastructures, areas that cause IT teams to relinquish some level of control, security pros …

The post User identity and access management: New data security perimeters appeared first on DataGravity Blog.

SMBs vs. enterprises: Does data security differ between the two?

Different people – and different companies – have varied interpretations of data security. Maybe you’re a small corner store, and for you, “security” always translated to locks on your doors and new tapes in your …

The post SMBs vs. enterprises: Does data security differ between the two? appeared first on DataGravity Blog.

Scroll to top