The Ultimate Guide to Data Protection
2023 edition
Overview
Data is the lifeblood of many organisations, which is why protecting it at all costs is so important.
Not only is data protection essential from a business operational sense, but legally many laws say data must be protected as well.
Data Protection is a term often used in a legal context (such as the General Data Protection Regulation) and involves the security, privacy, availability, and integrity of data.
Companies should engage in the concept of data protection by mitigating cyber risk and utilising strategies to keep their data safe and secure.
Analyst reports

Forrester Research on Cloud
Barracuda accelerates growth in its data protection bus...
Fri, 30th Sep 2022

Polaris Market Research on Firewall
Polaris research finds major growth trends in the globa...
Tue, 13th Sep 2022

ABI Research on Cloud
MES software investment to reach $5.4 billion in 2031 -...
Fri, 9th Sep 2022

Gartner on Magic quadrant
Fastly named Challenger in Gartner Magic Quadrant repor...
Wed, 7th Sep 2022

Gartner on Privacy
CyberRes top choice for Voltage data privacy and protec...
Mon, 29th Aug 2022
Expert columns

By Antti Nivala of M-Files
How businesses can get the most out of workflow automat...
Yesterday

By James Cook of Entrust
Public Key Infrastructure adoption and the future of cy...
This month

By Mark Lukie of Barracuda
Why cloud-based resources still need effective backup
Tue, 31st Jan 2023

By Jane Edwards of IOTICS
How Auriga's IOTICS partnership leads the way for utili...
Thu, 26th Jan 2023

By Billy Loizou of Amperity
Is your dirty data messing with business productivity?
Thu, 19th Jan 2023
More expert columns

By Jim Steed of Nutanix
Public cloud hasn’t delivered, but a time warp back to ...
Mon, 16th Jan 2023

By Robert Linsdell of Vertiv
Beat the heat – keeping A/NZ data centres cool in a hot...
Mon, 5th Dec 2022

By Jeremy Daly of DDLS
The key things needed to narrow the cybersecurity skill...
Thu, 17th Nov 2022

By Alex Lei of Proofpoint
Insider threats cannot be eliminated but zero-trust can...
Thu, 10th Nov 2022

By Tom Ascroft of Unit4
How leaders can safeguard customer data against today's...
Wed, 9th Nov 2022

By Aaron Bugal of Sophos
Updating your cyber resilience with MDR
Thu, 27th Oct 2022
Top players
You can read more from the top players Veeam, Dell, Micro Focus, Trend Micro, and Amazon Web Services.
Recent news

About Security vulnerabilities
Claroty uncovers vulnerabilities in Akuvox intercom sys...
Last week

About Digitalisation
Knowledge: the competitive advantage of an IT partner
This month

About WatchGuard Technologies
WatchGuard releases new firewalls to better protect net...
Last month

About Distributed Denial of Service
Radware launches new series of attack mitigation platfo...
Last month

About Veeam
Veeam’s new data platform helps businesses fight ransom...
Last month
More expert columns

By Aaron Bugal of Sophos
Updating your cyber resilience with MDR
Thu, 27th Oct 2022

By Carolina Valencia of Aqua Security
How to protect against the growing fileless malware thr...
Wed, 31st Aug 2022

By Eugene Ostapenko of illion
Safeguarding your financial data
Tue, 16th Aug 2022

By Eric Hui of Equinix Asia Pacific
Advancing genomic sequencing and public health with dig...
Fri, 12th Aug 2022

By Diego Betancur of Nozomi Networks
Zero Trust, but verify - finding the OT in ZerO Trust
Fri, 12th Aug 2022

By Robert Nobilo of Virsec ANZ
Applying Aristotle’s ‘First Principles’ to revolutionis...
Wed, 20th Jul 2022
Even more expert columns

By Robert Nobilo of Virsec ANZ
Applying Aristotle’s ‘First Principles’ to revolutionis...
Wed, 20th Jul 2022

By Brandon Voight of Micro Focus
Information management capabilities to meet privacy req...
Wed, 25th May 2022

By Alastair Miller of Aura Information Security
Backing up your business is about more than preventing ...
Thu, 24th Mar 2022

By Robert Vinokurov of Dell Technologies
Three tech tips to thrive in a remote work future
Wed, 23rd Mar 2022
More news

About Immigration New Zealand
Data ethics group discusses constraints of not having r...
Last month

About Storage
Arcserve launches latest UDP with new advanced capabili...
Fri, 20th Jan 2023

About Veeam
Spectra Logic BlackPearl S3 gains Veeam Ready Qualifica...
Fri, 6th Jan 2023

About Ransomware
Increased risk for detrimental damage caused by ransomw...
Thu, 15th Dec 2022

About Trend Micro
Trend Micro launches new protection deployment model
Tue, 6th Dec 2022
Even more news

About Cybersecurity
Bazaarvoice achieves ISO/IEC 27001 security certificati...
Tue, 6th Dec 2022

About Amazon Web Services
Barracuda to optimise access to email security data wit...
Wed, 30th Nov 2022

About Trend Micro
Customer records compromised in 29% of NZ orgs - Trend ...
Thu, 24th Nov 2022

About BlackBerry
BlackBerry SecuSUITE expands partner network in Asia Pa...
Wed, 23rd Nov 2022

About Dell
Dell enhances zero trust security with latest updates
Mon, 21st Nov 2022
Other guides
You can read other related guides from Cybersecurity, Cloud, Breach Prevention, Disaster Recovery, and Marketing Technologies.
Powered by