Discover how Acronis outlines competitors with integrated cyber protection, ensuring unmatched security, backup, and recovery solutions.
The outbreak of the coronavirus and the travel restrictions put in place to contain its spread means many companies must leveraging remote work practices to keep their businesses moving and employees safe. But without a secure way to share vital, proprietary data, remote work can put a company at risk. Given risks that an unsecured sharing solution can introduce, here’s a look at how secure file sync and share can help organizations enable a safe and efficient remote working environment at all times.
With pitchers and catchers arriving in Fort Meyers, FL, the Boston Red Sox are starting to prepare for their 2020 season. That will involve analyzing a lot of data, all of which must be protected. Brian Shield, Vice President of Technology and IT for The Boston Red Sox, shared an in-depth look at everything IT at the Acronis Global Cyber Summit last year, which provided keen insights into how world-class, data-driven organizations safeguard their infrastructure. After his presentation, John Furrier of SiliconANGLE’s theCUBE interviewed Shield to discuss the IT needs of the Sox – from how Acronis enables Fenway Park to respond to cyberthreats to how new 5G technology is being tested at the stadium to how data is used in the MLB to detect talent and signal imminent injuries.
Pax8 is the cloud distribution leader for the IT channel. Born out of the challenges emerging within traditional distribution because of cloud delivery and consumption models, Pax8’s mission is to enable the IT channel to simplify cloud buying through billing, provisioning, automation, PSA integrations, and pre- and post-sales support.
Ransomware continues to be an active, evolving threat and one of the newest strains to emerge is Snake (also known as EKANS, which is simply “Snake” spelled backward). First appearing at the end of December last year, the most interesting feature of Snake is that it targets industrial control systems (ICS) environments – not the individual machines, but the entire network. Designed to terminate specific processes on victim machines, including multiple items related to ICS operations, it also deletes Volume Shadow Copies to eliminate Window backups. While there is currently no decryption available, systems running Acronis Active Protection – the AI-based anti-malware defense that is integrated into our cyber protection solutions – successfully detects Snake ransomware as a zero-day attack and stops it in its tracks.