How do I love thee network engineer, let me count the ports. 3, that’s right just 3 ports (okay, maybe 5 if you want automated agent installs) you will need to open on your firewalls to get fantastic, fully functional data protection for your entire
Yesterday, Acronis SCS signed a White House pledge to help America’s workers and our nation’s veterans thrive. Through the Acronis SCSVets initiative, which will formally launch in October, we pledge to help 300 veterans, active duty military, and military spouses over the next five years develop the cyber certificates,
A Gap in the Backup Market In today’s backup and recovery software market, there is a troubling gap for public sector customers operating in air-gapped, ‘no internet’ environments. In particularly challenging settings, like deployed defense elements at the edge or those with sensitive or classified
The Data Protection Evolution In the decades since cybersecurity became a key priority for companies and federal government agencies alike, we have witnessed a necessary evolution in information security doctrine and strategies. For years, layered data protection tools – from perimeter defense to identity management
Arizona’s Election Security Landscape With the 2020 campaign season well underway, US states are working hard to shore up their election systems before the upcoming primaries. Arizona has good reason to be a part of this nationwide reckoning: as Arizona’s Secretary of State Katie Hobbs
Last month, I attended one of the stops on the Department of Defense’s (DoD) Cybersecurity Maturation Model Certification (CMMC) listening tour to gain a better understanding of future cyber hygiene expectations for the defense industrial base (DIB). The CMMC, which was first announced in June, is the Department’s fresh
Ransomware, which the US Department of Justice has defined as any “form of malware that targets your critical data and systems for the purpose of extortion,” has dominated headlines in 2019, but the mode of attack is far from new.
Acronis SCS’s backup software is often deployed in networks with strict firewall segmentation. The benefits of segmentation are well established; in fact, they are often considered a key step in an organization’s adoption of a zero trust framework.