Jon Oltsik

Jon Oltsik
backup compliance data expect expensive found goes hypothesis include lead legal likely lost missing percent public reported result security simply standard storage survey tape users violations
Mission-critical data that goes missing could result in legal liabilities and regulatory compliance violations -- an intolerable situation. One would expect that security-conscious organizations would include tape encryption as a standard security defense. Unfortunately, this hypothesis simply isn't true. In a survey of 388 storage professionals, ESG found that only 7 percent of users reported that they always encrypt their backup data while 60 percent said that they never do. There will likely be many more instances of lost tapes, which may lead to embarrassing public disclosures and expensive notification efforts.
architecture household name visible
By the end of this year, you'll have a visible household name with an all-Linux architecture.
addressing figured fits good internal job oracle overall processes security
Oracle is doing a good job of addressing security in its products, but they haven't figured out how security fits into their internal processes and overall architecture,
boxes data dock ebay goes left next
Cartridges can sometimes be left in unmarked boxes on a loading dock next to somebody's eBay package. Often the most important data goes through the least sophisticated processes.
dominant gone open opportunity wide
It's a wide open market, ... Cisco will be in the game, but what's gone for them is the opportunity to have a dominant propriety solution.
across clearly cry data fair help holes identified large number policies process processes report research resulted security somewhat trained troubling users view
This research process resulted in some eye-opening and somewhat troubling conclusions. Large organizations identified security holes across a number of areas. Security processes are fair at best, and most users have not been trained on security policies and risks. I view the data from this report as a cry for help - clearly something must be done soon.