Wright-Pierce Finds NetApp AltaVault Solution and Amazon S3 Data Storage Cost Less and Easier to Maintain Than Disk-to-Disk Options

Wright-Pierce is an award-winning engineering firm specializing in water, wastewater and infrastructure services for public and private clients. Their challenges are to increase amount of data must be stored and expanding disk-to-disk backup system is too costly. They chose NetApp to overcome these challenges. They have implemented NetApp AltaVault cloud-integrated storage (formerly SteelStore) and Amazon S3 cloud storage. The results of implementing NetApp were countless man-hours saved by having only one backup appliance to maintain, lower backup-related costs (less power and cooling; no need to expand disk-to-disk system; archival storage device retired), greater data security, very affordable monthly cloud fee and restore in minutes versus several hours with tape.

Spotlight

ENISA

ENISA is Europe’s ’cyber security’ agency, and a body of expertise in this field. ENISA is supporting the European Commission, the Member States and the business community to address, respond and especially to prevent cyber security problems, for the benefit of citizens, consumers, the digital economy, and public sector organisations in the European Union. As a body of expertise, the Agency assists the European Commission in the technical preparatory work for updating and developing Community legislation in the field of Network and Information security (NIS).

OTHER WHITEPAPERS
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More
news image

AWS Best Practices for DDoS Resiliency

whitePaper | December 5, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary direct costs when your infrastructure must scale in response to an attack.

Read More
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More
news image

DeltaV SIS™ and Cybersecurity

whitePaper | November 28, 2019

Safety Instrumented Systems (SIS) are designed to keep processes safe, especially during critical situations. With this concept in mind, it is paramount that the SIS components are not taken down due to cyber-threats. The purpose of this white paper is to explain, in detail, the Emerson approach for cybersecurity as well as the built-in security features available within the DeltaV SIS process safety system.

Read More
news image

Cybersecurity Whitepaper 2018

whitePaper | December 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats they face, which is in sharp contrast to what attackers think.

Read More
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More

Spotlight

ENISA

ENISA is Europe’s ’cyber security’ agency, and a body of expertise in this field. ENISA is supporting the European Commission, the Member States and the business community to address, respond and especially to prevent cyber security problems, for the benefit of citizens, consumers, the digital economy, and public sector organisations in the European Union. As a body of expertise, the Agency assists the European Commission in the technical preparatory work for updating and developing Community legislation in the field of Network and Information security (NIS).

Events