{"id":3757,"date":"2014-09-16T11:04:03","date_gmt":"2014-09-16T11:04:03","guid":{"rendered":"http:\/\/www.telecomstalk.com\/?p=3757"},"modified":"2018-06-06T10:11:26","modified_gmt":"2018-06-06T10:11:26","slug":"idc-report-strengthens-attix5-drive-to-encourage-cloud-adoption-by-demonstrating-effective-security-solutions","status":"publish","type":"post","link":"http:\/\/www.telecomstalk.com\/?p=3757","title":{"rendered":"IDC Report Strengthens Attix5 drive to encourage Cloud adoption by demonstrating effective security solutions"},"content":{"rendered":"<p>With cloud playing a leading role in business operations, companies are trying to protect their cloud based storage without compromising on their security. According to research from a recent IDC report \u201880 percent of companies estimated downtime would cost them $20,000 per hour\u2019.<br \/>\nIDC\u2019s report also showed findings that suggested some organisations aren\u2019t backing up to the cloud because of major security concerns. Cloud backup, enables you to store your data and files on the Internet in the \u201ccloud\u201d. This means that if something goes wrong with your equipment, your computer, device or external hard drive your data won\u2019t be affected and will still be accessible. <\/p>\n<p>More and more companies are adopting the cloud and several are considering the move to cloud based storage, the recent IDC survey found that \u2018nearly two thirds of SMB\u2019s are using cloud based storage for remote location disaster recovery\u2019 but it also established that 59% of Western European and 45% of Pacific Asian organisations were stating security as their main reason for not adopting the cloud. These findings leave companies such as Attix5, expert developer of data protection software to demonstrate their expertise within the market.<\/p>\n<p>Luv Duggal, General Manager of Sales for Attix5 UK, commented, \u201cAttix5 data protection software was the first commercially available software tool that backs up data to the cloud using secure true multi-tenant deduplication technology. Security runs in our veins \u2013 it forms the foundation of all our products and solutions. The data gets encrypted using FIPS-compliant AES encryption on the client-side before it gets passed over the network. Without the encryption key (only known to the user) the data is unusable to anyone, including hackers.\u201dAttix5\u2019s DynamicRestore provides end-users with immediate recoverability in the event of a loss of critical servers and data. The innovative patent-pending business continuity and recovery technology, gives service providers the ability to offer a managed, multi-tenant, Cloud-based recovery solution to their end-users. DynamicRestore enables businesses to get their operations back up and running within minutes rather than days, reducing recovery time and saving businesses from economic failure.<\/p>\n<p>Eric Burgener, research director of Storage at IDC commented, \u201cData sizes and types continue to evolve, as does the number of servers and operating systems each company uses. This leads to a host of new challenges IT managers face to make sure they can back up and protect their data and restore operations quickly.\u201d<br \/>\nCloud solutions not only enable cost efficiency, enhanced access and the ability to scale, but they are deployed in secure locations and offer enhanced security capabilities to continuously mitigate risks.  Security isn&#8217;t a key competency for many organisations, but it&#8217;s the central foundation for cloud service providers which support large enterprise clients.<\/p>\n<p> \u201cCompanies who want to grow their business, have the highest data availability and protection levels without unnecessary IT costs, need to get their heads in the cloud\u201d Commented Luv Duggal.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With cloud playing a leading role in business operations, companies are trying to protect their cloud based storage without compromising on their security. According to research from a recent IDC report \u201880 percent of companies estimated downtime would cost them &#8230; <span class=\"more-link\"><a href=\"http:\/\/www.telecomstalk.com\/?p=3757\" class=\"more-link\">Read More<\/a><\/span><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[291,414,415,412,413],"class_list":["post-3757","post","type-post","status-publish","format-standard","hentry","tag-attix5","tag-data-protection-software","tag-eric-burgener","tag-idc","tag-lu-duggal"],"_links":{"self":[{"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=\/wp\/v2\/posts\/3757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3757"}],"version-history":[{"count":1,"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=\/wp\/v2\/posts\/3757\/revisions"}],"predecessor-version":[{"id":3758,"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=\/wp\/v2\/posts\/3757\/revisions\/3758"}],"wp:attachment":[{"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3757"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.telecomstalk.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}