Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
WOBURN, MA -- (Marketwire) -- 12/06/12 -- On the heels of the cloud's widespread adoption in 2012, 2013 will be the year in which the cloud's storage capabilities are truly leveraged for enterprise mobility and data accessibility. And, with IDC claiming that combined spending for public and private cloud storage will reach $22.6 billion worldwide by 2015, Acronis predicts cloud storage will play an integral role in IT strategies in 2013. Organizations will use it to meet increasing demands for data availability, protect against security concerns of enterprise mobility, manage the explosion of data and see it as a strategic differentiator.
Traditionally, the cloud's capabilities have been focused on server scalability, hardware optimization and the portability of applications from one virtual server to another within the cloud fabric, but 2013 is the year the cloud will make an even greater business impact through its storage capabilities.
Storage costs have the ability to cripple an IT department's budget. And, with businesses and consumers creating 2.5 quintillion bytes of data per day, it's essential for organizations to find a cost-effective storage solution that can handle the volume, variety and velocity of growing data. This means finding new approaches to ensure all needed data is backed up, accessible and available for business critical functions, while reducing storage costs. In 2013, this will be achieved through hybrid cloud infrastructure that will seamlessly integrate on-premise and cloud environments, and by the use of new technologies to reduce the cost and increase the availability of data stored in the cloud.
"Businesses will not be able to compete without hybrid cloud storage strategies," said Scott Crenshaw, SVP of Strategy and CMO, Acronis. "The need to create, store and access more data, from mobile and traditional computing devices, makes old storage and data protection solutions obsolete, inflexible and expensive. If IT departments don't provide end users with this capability, end users will bypass IT and obtain it themselves."
The premiere cloud strategy of 2013 and beyond will also increasingly address the security concerns of the rising enterprise mobility trend. A Harris Interactive survey found that 81 percent of employees use at least one personal device for business use, and it is likely that these employees are collaborating and accessing sensitive data outside the company network. To expel security concerns, IT managers will take a holistic approach to the cloud in 2013, implementing comprehensive solutions that address the security and availability of data both inside and outside the traditional IT infrastructure.
About Acronis
Acronis is leading the next wave of data availability, accessibility and protection solutions to simplify today's complex IT environments. Acronis technology enables organizations of all sizes to manage the always-on anywhere data access demands of users, reducing risk against the loss of valuable corporate data, and controlling management and storage costs. With proven technology for data migration and disaster recovery for physical, virtual and cloud environments, and secure enterprise file-sharing and synchronization regardless of type or platform, Acronis is enabling organizations to embrace new IT strategies and options such as BYOD and Mac in the enterprise. For additional information, please visit www.acronis.com. Follow Acronis on Twitter: http://twitter.com/acronis
Acronis® is a registered trademark of Acronis International GmbH. in the United States and/or other countries.
Add to Digg Bookmark with del.icio.us Add to Newsvine
Media Contact
Meredith L. Eaton
March Communications
Tel: +1 617-960-9877
Email: acronis@marchpr.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs