Cloud computing has given rise to a new paradigm of software application development. It provides the users with on-demand access to reconfigurable computational resources that can be provisioned rapidly with minimal manual intervention, giving users the power to develop any type of software application. Cloud computing is an amalgamation of various technologies such as virtualization, web services, inexpensive hardware and multi-tenancy. Organizations often move data to the cloud from their own data centers and vice versa. The movement of critical and sensitive data is often a cause of concern for organizations. The various models provided by the cloud service providers are interdependent and a security breach in one layer, like Platform as a Service (PaaS), will affect both Software as a Service (SaaS) and Infrastructure as a Service (IaaS) models.Read More
If you thought security breaches are something that happens to others and never to your enterprise, you need to think again. Security breaches are more common than you think! It could happen to your company as easily as it can happen to others!Read More
Health Insurance Portability and Accountability Act (HIPAA) sets rules and regulations to protect important data of patients. Whenever a company receives Personal Health Information (PHI), it gives surety that network, process and physical safety measures are followed appropriately to protect the data. Privacy Rule HIPAA is mentioned at CFR 45 Part 160 as well as Part 164. This rule specifies that medical record of patients and their personal health information must be protected by proper health plans and health care providers. This rules demands that suitable safety measures must be created by companies to safeguard the health information of individuals. In case it is required to disclose the health information, it must be carried out by patients’ approval. Patients also have the right to demand a copy of their health records or ask for some corrections in given records.
It used to be the case that data backup was something that was done in order to meet compliance requirements, and use only in the event of major outages and failure. Back then, data backup was done on tape, restoration took a long time, and individual files couldn't be restored - only entire volumes and drives.Read More
A Letter From the CEO
In the ever-changing world of technology, it is comforting to know that EVS, your partner in Backup and Disaster Recovery (BDR) is staying abreast of the latest trends. As we continue to evolve and expand our portfolio of BDR solutions, we strive to offer the best-in-breed solutions to meet the changing needs of our client’s business recovery strategies.
Costly to transport, vulnerable to loss, and often unencrypted, tapes are increasingly becoming a relic in the data backup world. Those who have been using backup tapes for years may swear by their reliability, but if they were to experience a disaster, they might learn their true cost.