Protecting Compliance in the Public Cloud

Post by Christine Taylor (thank you)

When it comes to compliance, different regulations exist for different industries. For example, the Health Insurance Portability and Accountability Act (HIPAA) is the granddaddy of healthcare-related compliance. Payment Card Industry Data Security Standard (PCI DSS) oversees the credit card industry, while Sarbanes–Oxley (SOX) regulates the reliability of financial reporting by public companies and their accounting firms. The Gramm-Leach-Bliley Act (GLBA) administers a large set of compliance regulations for banks, investment institutions and insurance firms. And there are many more including US–EU Safe Harbor, ISO, FDA and a whole set of federal regulations around information processing, security management and risk management.

Read on here

DR-as-a-Service: Compliant DR Protection for the Mid-Market

Good post by Eric Slack (thank you)

There is no shortage of stories in the IT press about the effects of disasters, like 9/11 or Hurricane Sandy, where buildings are destroyed, data centers flooded, etc. While these are sensational events, for sure, they’re not the types of disasters that are most likely to affect a typical company. Far less dramatic things happen every day that can still have disastrous consequences for the companies that aren’t prepared with an effective (and appropriate) DR plan.

Read on here

System Storage Archive Manager (SSAM 6.3) is certified for compliance

Good news by Nils Haustein (danke !)

We have great news: There is an excellent replacement alternative for IBM Information Archive (IA) and DR550 as well as for new archiving solutions: the SSAM solution. System Storage Archive Manager (SSAM) is a variation of Tivoli Storage Manager (TSM) which is made for compliant archiving and is key component in IA and DR550.

Read on here

Transform Backup Data into an Information Advantage

Good post by Colm Keegan (thank you)

Backup infrastructure is somewhat like an expensive insurance policy. Large premiums are expended on backup hardware, software and people resources to collect, store and protect business information in the event a “claim”, or in this instance, a data recovery event needs to take place. What if backup infrastructure could provide value even if no “claims” need to be filed? This article will discuss how to transform backup data into a business asset.

Read on here