When DataEndure marked its 40th anniversary, our CEO Kurt Klein reflected on how our mission has evolved: “If you look at us 40 years ago, we were all about resilience and data protection. That’s still true today, but the demands have become more complex and multifaceted.” Today, digital resilience isn’t just an advantage—it’s a necessity. Resilience means having the ability to adapt, recover, and thrive amidst ongoing technological, operational, and… Read More
DataEndure at 40: From Data Protection to Digital Transformation
As DataEndure marks its 40th anniversary, CEO Kurt Klein reflects on the company’s journey and what has fueled its longevity. DataEndure’s journey from a small value-added reseller to a leading technology integrator and managed security services provider reflects not only its resilience but its remarkable ability to adapt and evolve. With CEO Kurt Klein at the helm for nearly three decades, DataEndure’s story is a testament to innovation, strong partnerships,… Read More
Why Traditional Backups Fail Against Ransomware—and What to Do Instead
As cyberattacks grow more advanced, achieving digital resilience requires more than a traditional ‘set-it-and-forget-it’ backup approach. Legacy methods no longer provide the protection necessary against today’s sophisticated threats—especially ransomware. To safeguard your data and ensure business continuity, you need a modern backup strategy that encompasses cyber resilience as an integral part of a holistic approach, ensuring your systems can withstand and recover from attacks. The Limitations of Traditional Backups Traditional… Read More
Strategies to Operationalize Cybersecurity for Enhanced Data Protection
Organizations are navigating a perfect storm in data protection, driven by a rapidly evolving threat landscape and the exponential growth of data. With global data volumes projected to reach 175 zetabytes by 2025, the need for robust cybersecurity measures to protect that data has never been more critical. Operationalizing security measures is essential to effectively safeguard any organization’s vast amount of sensitive information. 8 Strategies to Operationalize Data Protection Operationalizing… Read More
Manual Selection vs. VMware Intelligent Policy?
Originally posted by DataEndure Principal Engineer, Brian Herbeck, on linkedin.com As enterprise environments grow, complexity follows. Many IT departments struggle to adhere to standard processes, maintain documentation and manage change. And significant gaps or changes can lead to backup failures. Current NetBackup versions allow for significant customization and control surrounding virtual machine protection. This article covers the advantages and use cases for using both manual selection and VMware Intelligent Policy…. Read More
Your Unstructured Data is Holding You Back
You hear the term “unstructured data” often – data that is unorganized or doesn’t follow a structured data model. Gartner’s IT Glossary defines the term as “information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes.” Unstructured data is often blamed as the reason why traditional relational databases don’t meet the needs of Big Data. But that conversation doesn’t adequately describe… Read More
Case Study: DataEndure and Actifio Deliver Digital Resilience
This case study from Actifio on DataEndure is available in its entirety as a PDF here. Legacy Approaches Transformed with Modern Solutions DataEndure helps organizations protect, secure, access and capitalize on their data. However, they were seeing customers struggle with legacy systems and outdated strategies that no longer served business requirements. Customers needed a fresh approach that would take advantage of more advanced technology to accelerate, simplify, and reduce costs, especially… Read More
Does your Disaster Plan Really Exist if you Never Test it?
Regardless of industry, when an unexpected event takes place and brings day-to-day operations to a halt, your organization needs to recover as quickly as possible and continue to provide services to its clients. From data security breaches to system disruptions to natural disasters, no business is immune to risk. Not having a disaster recovery plan in place can expose the organization to high financial implications, reputation loss and even greater… Read More
How Gemalto’s Tokenization System Protects Information
These days, some online payment processors, particularly mobile processors, rely upon tokenization to help improve security. For example, this technology empowers Apple Pay. Major credit card companies, like MasterCard, Amex, and Visa, are also now backing projects to help improve digital security with tokenization. Problems With Traditional Credit Card Payments Insecure payment processing schemes leave merchants, card holders, and card companies vulnerable. This kind of crime results in the loss… Read More
Who does CASB and Why Do We Need It?
A cloud access security broker, usually referred to as a CASB, offers a security gateway between your company’s IT infrastructure and that of a cloud provider. Companies use a CASB to extend their own IT governance policies and government regulations to third-party software and storage. If you have concerns about internal or external security threats, monitoring usage and behavior, or auditing historical data, you may need a CASB. To understand… Read More