Market Roundup Iron Mountain Physical Storage and New Archiving Service for Email Good Combination Seagate Now Shipping Hardware-Encrypted Notebook Drives |
|
Iron Mountain Physical Storage and New Archiving Service for Email Good Combination
Iron Mountain Incorporated this week introduced its Active Archiving Service for Email, a comprehensive solution for managing email storage, retention, and legal discovery. The new archiving service allows businesses to cost-effectively reduce their email storage burdens, apply granular email retention policies, securely archive email, and enable efficient ediscovery of messages while providing end users with easy access. It completes Iron Mountain's Total Email Management Suite that aims to provide email storage management, discovery, continuity, and disaster recovery and security services in a single, integrated, solution. The Active Archiving Service for Email, which is delivered through a partnership with MessageOne, is available on its own or as part of Iron Mountain's Total Email Management suite. The full suite includes Continuity Service for Email, a managed service that can be rapidly activated following a network interruption, facilities outage, or other event that disables an organization's primary email system; and Security Service for Email, a managed service that automatically eliminates spam, viruses, and unwanted content from the email environment. Additional features of the Active Archiving Service for Email include flexible storage management, auditing of email retention policies with support for litigation holds; ediscovery to make it easy for legal counsel and authorized users to search selected mailboxes and export results to legal review tools; and integration with Microsoft Outlook to allow end users to work in their familiar email environment. The Active Arching Service for Email, along with the Total Email Management Suite, is immediately available in the U.S, UK, Germany, and France, with plans to introduce to other countries over the coming months. In the U.S., the Total Email Management Suite pricing starts at $6 per user per month.
Just as it is impossible to separate people, process, and technology, sometimes it’s equally difficult to separate the physical from the virtual. When it comes to the information and document life cycles, Sageza believes that organizations need to protect information based on its value, not its form. In the Defense world classified information is classified whether hard copy, electronic, or verbal. Consequently the protection mechanisms that are applied in national security matters are based on the classification of the information, not where it’s found. Best practices call for an integrated and holistic approach to information protection. Furthermore, we have noticed a trend by larger organizations to try and reduce their cost of purchasing operations by reducing the number of vendors they deal with.
Given the need to protect information and data across the organization and regardless of format, it would appear that Iron Mountain may be positioned to take advantage of technology trends by varying their way of delivering services and offer end-user organizations a way to reduce their cost of acquisition.
Seagate Now Shipping Hardware-Encrypted Notebook Drives
Seagate Technology has announced that it is now shipping its
Momentus 5400 FDE.2, an encrypting 2.5-inch notebook PC hard drive for
notebooks, to
With all the fuss about security, data theft, compliance, and whatnot, the market has seen many vendors ply their data security solutions ware with an increasing zeal. Software-based encryption for files or hard drives is not new; however, the interest in it has grown considerably in light of recent embarrassing, if not illegal, data leaks or losses reported by various organizations. One of the challenges with software encryption is that it is generally not well understood by the technical layperson, and implementations often tend to be limited or specific in nature, e.g., encrypting email or certain files associated with a given application. By incorporating encryption at the hardware level, its use can be largely invisible to the user, which can remove a large obstacle to an effective deployment.
While many may view encryption of mobile devices such as notebooks solely as a means to block access to sensitive data in case of loss or theft, it can also prove advantageous to IT professionals. Depending upon the practices of an organization, sometimes a notebook may be “reassigned” to a new user, without IT’s knowledge. It probably will not have been recovered to its factory-shipped configuration and the drive may still contain sensitive information even if it was deleted. With configuration software such as the Trusted Drive Manager, IT can intercept such a transfer at the preboot authentication phase by having the system not grant access if the user is not recognized as part of the preboot authentication, which is under the control of IT. The system would then flow back through IT, which can then take whatever preventative actions necessary to ensure the safety of sensitive information before repurposing the notebook to its new user.
Hardware-based encryption for notebook hard drive is new, and obviously it will be some time before it is commonplace. Nevertheless, we believe the security and best practices afforded by their use in highly regulated industries is a no-brainer and expect to see such deployments grow, especially as Seagate signs up more and larger notebook vendors to include the Momentus 5400 FDE.2 and similar solutions into their product offerings.
S.P.I. Dynamics, Inc. has announced its latest version of the Assessment Management Platform (AMP), version 3, that includes a Web-based interface for multi-user lifecycle collaboration and control of application security risk throughout the enterprise in a consolidated global view. AMP 3 includes a new Web user interface to give security professionals, executives, line managers, developers, and quality assurance teams anytime/anywhere access to AMP functionality. Core application security experts can now extend their team by giving developer and QA professionals the ability to quickly execute application security tests or access information about application security quickly without the effort associated with software installation, configuration, and maintenance. The Web interface provides users the ability to configure their interface, data, and dashboards exactly as they need them. Organizations are able to reduce costs by using AMP throughout the application development lifecycle for collaboration on finding and fixing application-level security defects early prior to production. AMP 3 also includes a new risk management component, application weighting, which allows users to prioritize and sort applications within their organization by a combined risk score that is based on vulnerabilities found and the importance of the application to the business. This enables organizations to identify and focus on the riskiest sites without having to manually score all of the sites; AMP prioritizes all sites based on their risk score giving security professionals the information they need to plan and manage remediation programs.
Today, security professionals in all industries are dealing
with an ever increasing and overwhelming number of applications,
vulnerabilities, and technical experts around the world. They must identify
critical applications, maintain a holistic risk management view, and give
numerous stakeholders visibility into the state of application security across
the enterprise. While doing this, they must scale their assessment processes
across the enterprise and throughout the lifecycle to developers, quality
assurance teams, other security professionals, and even line-of-business
managers who own the applications. Organizations are striving for proactive application
security programs that find vulnerabilities early in the lifecycle, to avoid
excessive costs associated with fixing defects in production applications. To
do so, all of the stakeholders and participants require easy access to robust
application security testing tools that do not require security expertise. AMP
3 is powered by
While many have talked about the US SOX regulation, few have delved into some of the less obvious ramifications of the requirement to validate the integrity of the organization’s IT systems. The Software Development Life Cycle (SDLC) is generally something that is not top-of-mind to auditors and even security professionals. However, for organizations that are developing their own software, validation of the security of that development and continual evaluation of application security are ongoing requirements. While commercially purchased software may claim various levels of application security, the astute organization will trust no one and validate everything.
Sageza believes that the SDLC is becoming more complex for a
number of reasons. First of all most large organizations have distributed
development teams. In addition, key stakeholders such as information security,
risk assessment, governance management, and so forth are distributed as well.
We are of the opinion that a secure, Web-based infrastructure seems to be the
most logical way to address the security issues inherent in the SDLC and the
HP Meets New ENERGY
On
We imagine that even though the target market is business, consumers will also be early adaptors of the technology, in part because it is less risky to buy one PC than 1,000, and the economies of scale would dictate that HP will eventually roll these capabilities across a broad portion of its product portfolio. However, businesses are always looking for ways to reduce overhead; if they can help out the environment along the way, so much the better. We believe that the energy cost savings from HP’s new desktops will help make them attractive and it represents another step in the right direction, as every little bit helps. One of the big problems is still the huge amount of waste from old PCs and laptops not being recycled or properly disposed of. This is something that HP and its market challenger Dell as well as Fujitsu Siemens in Europe have recognized for some time. On the other hand, not all PC manufacturers have been touting their strategies for making their machines more energy-efficient. An environmentally friendly solution that saves end users money is likely to be more rapidly adopted by the marketplace, even if certain regulatory initiatives issues seeking to address the issue are in the offing.
Green is the new black. However, everyone is paying lip service but few are following up. The companies that are making steps forward in that direction, no matter what size steps they are, deserve accolades and awards. The report that Greenpeace puts out periodically is one way to track progress; a monetary incentive would be even better: a sort of Nobel for the tech world, say. However, as end users battle higher energy costs, appliances that use less electricity are become more attractive and thus generate more sales. That in itself may be enough of a financial incentive for more green innovations from a larger sampling of companies. If the U.S. Congress believes in saving energy to the extent that it flagrantly messes about with Daylight Savings Time, then it won’t be long before it turns its attention to other aspects of our lives. HP seems to be ahead of the curve and at least three steps ahead of the U.S. government. We applaud their efforts.