Information Security

  • July 30, 2020

Privacy Shield has been invalidated, and SCCs are next… Now what?

The CJEU ruled the Privacy Shield did not include adequate limitations to ensure the protection of EU personal data from access and use by US authorit...
Read MORE
  • July 16, 2020

Clouds, Backdoors, Secrecy Orders, and the Lawful Access to Encrypted Data Act

By relinquishing control of their data to a 3rd-party cloud, companies have made it easier for governments to obtain their data without them ever know...
Read MORE
  • June 30, 2020

CCPA Enforcement has Begun - The Risks Most Companies are Not aware Of

Unlike the EU’s GDPR, the CCPA includes a surprising provision that requires a company to be able to “look-back” 12 months from the law’s effective da...
Read MORE
  • June 10, 2020

The Need for Consolidated IoT Data Archiving and Management

How many organizations would even think to consider archiving IoT data residing in the many devices propagating the average business?
Read MORE
  • February 19, 2020

Infrastructure versus Information Cyber Security in the Cloud

What is “cyber security” in the cloud? Why is it important to think about security from both infrastructure security and information security perspect...
Read MORE
  • December 11, 2019

Privilege Escalation Attacks and The SaaS Cloud

60%+ of enterprise executives plan to retire current SaaS applications amid growing security fears. New Research from Pulse Q&A detailing Security Req...
Read MORE
  • February 14, 2019

Data Sovereignty and the GDPR; Do You Know Where Your Data Is?

As more companies move their data to the cloud, the question of data sovereignty is becoming a hotter topic...
Read MORE
  • February 8, 2019

The Right to be Forgotten Versus The Need to Backup

A great deal has been written about the GDPR and CCPA privacy laws, both of which includes a “right to be forgotten.” But how does this new right affe...
Read MORE
  • February 1, 2019

Is Standard Computer Soft-Deletes Good Enough for Privacy Regulations?

Government privacy regulations, including GDPR, CCPA, and others all include some form of the right to data erasure, otherwise known as the right to b...
Read MORE
  • November 22, 2016

Beware the Security Risk of a Legacy Email Archive

Consider for moment the amount of sensitive company information that is contained in an aging email archive. Can you say it is adequately secure?
Read MORE
  • May 31, 2016

Feds Open Up Trade Secret Litigation Floodgates- Part 1

President Obama signed into law the Economic Espionage Act of 1996 known as the “Defend Trade Secrets Act of 2016”
Read MORE
1 of 1

Contact us to Learn More

Let’s discuss how to manage:
Your Data in Your Control with Your Security in Your Cloud.


Paas vs Saas Thumbnail

PaaS vs SaaS Archives: What You Need to Know

All cloud archives are not created equal. There are major differences between archives deployed in a SaaS model versus a PaaS model that affect the security, accessibility and functionality of your archived data. This Technical Guide explores what you will need to consider in order to make an informed decision about PaaS versus SaaS.