3 Articles Tagged Securing the Everywhere Perimeter

Avaya Article Thumbnail

Data Protection Part 3: Where Does Encryption fit into Data Protection?

  • Greg Deffenbaugh
  • January 4, 2017 | Estimated reading time: 10 minutes to read
  • I’ve mentioned that the SNIA SDC Conference provided the catalyst for writing this blog series on data protection. (See part 1 and part 2.) While…
Avaya Article Thumbnail

Data Protection Part 2: What About Unauthorized Data Access?

  • Greg Deffenbaugh
  • December 16, 2016 | Estimated reading time: 7 minutes to read
  • In part 1, we explored the physical loss of data, meaning the data is no longer available for access (intelligently) by anyone. There’s another, perhaps…
Avaya Article Thumbnail

Time for a New Network Engine: Start Running on a Software-Defined Network

  • Greg Deffenbaugh
  • November 3, 2016 | Estimated reading time: 6 minutes to read
  • I grew up on a wheat farm in the 70s. I spent much of my teens and early 20s working on farm machinery, before starting…