Results > Blog

Redapt | Security & Governance

Blog

Best Practices for Enterprise Network Security in 2020 and Beyond

According to numbers compiled by Statista, in 2019 alone more than 160 million records were exposed through data breaches in the United States.

Read more

Blog

Watch The Webinar: Identifying & Developing a Data Storage Protection System

In this webinar, Redapt expert Matt Francis discusses how your enterprise can put in place systems that ensure your data is always backed up and protected.

Read more

Blog

How the Shift to Remote Work Has Impacted Data Security Governance

According to a recent report from McKinsey, in April alone, an estimated 62% of those employed in the United States had started working from home due to the pandemic. In comparison, that percentage...

Read more

Blog

Tech We Like: Dell EMC’s Data Protection Portfolio

The recent rise in remote work has cast a renewed focus on the critical need for data protection.

Read more

Blog

AI & Analytics While Ensuring Data Privacy, Compliance, and Security

Speed is everything today.

The ability to adapt on the fly, make smarter decisions quickly, and accelerate your time to market are what separate your organization from your competitors. 

Read more

Blog

3 Key Areas Where Enterprises Often Fail at Hybrid Cloud Implementation

Moving to a hybrid cloud solution can offer a number of benefits for your enterprise. These include the ability to shift workloads that burst in usage to the cloud, ease of scalability, and...

Read more

Blog

Getting Ahead of the Curve With Governance Security

As a leader in the public cloud space, Microsoft Azure has a plethora of information available for clients and the curious. One of our favorites is the Standard Enterprise Governance Guide, a...

Read more

Blog

How to Balance Enterprise Agility and Speed with Governance and Security

Agility and speed are the secrets to staying competitive. Maintaining governance and security are the costs of doing business. The question is: How do you achieve both?

Basically, it comes down to...

Read more

Blog

How On-Site Kubernetes Works to Improve Your IT Security

Originally developed by Google, Kubernetes (or K8s) are now the standard for container orchestration, supported by everyone from AWS and Azure, to Cisco, IBM, and VMware.

Read more

Blog

3 Best Practices for Data Storage Security in Healthcare

All healthcare providers tasked with electronically transmitting patient protected health information (PHI) must comply with the Health Insurance Portability and Accountability Act (HIPAA) Privacy...

Read more