article thumbnail

Security Industry Association Names Bill Bozeman as Honorary SIA Member

Security Industry Association

The knowledge I have gained, the decision makers I have met, the best-of-breed SIA conferences and the early adoption of security industry-specific project management, cybersecurity and now artificial intelligence leadership all speak to SIA’s vision and why I hold SIA in the highest regard,” said Bozeman. “I

article thumbnail

Zerto Virtual Manager Appliance – What You Need to Know

Zerto

For those using an external SQL server, the minimum requirements are MS SQL 2012 or newer, or Windows server 2016 or newer. The ZVMA is a turnkey appliance that can be deployed with minimal configuration from an OVF without the need to create a new virtual machine manually or to deploy and activate the operating system.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Business Continuity and Risk Management

BCP Builder

The Business Continuity Management System framework is the system that stitches activities together. of ISO 22301:2012) these can be sourced (in part) from the risk register and Enterprise Risk Management and evaluated with a Business Continuity Management lens. When you are evaluating the internal and external issues (Clause 4.1

article thumbnail

In Memoriam: Joseph Freeman, J.P. Freeman & Company

Security Industry Association

Freeman & Company, of which he was CEO for 30 years until he retired in 2012. Joe modeled a well-lived active life and approached each day with a sense of purpose and positivity. In 1982, Joe founded a successful home automation and security consulting and market research company, J.P.

article thumbnail

5 Ways Smart Cities Use Data—and 4 Ways to Keep That Data Secure

Pure Storage

In the aftermath of Hurricane Sandy in 2012, New York City emergency management officials realized there were flaws in the city’s data infrastructure. With artificial intelligence (AI), cities can identify unusual activity within data storage systems and alert IT leaders who can determine if the activity could be the result of a hack.

article thumbnail

The NFV Revolution Happening in Telecom

Pure Storage

In 2012, a global team of representatives from multiple telecoms authored a white paper that defined the idea of Network Functions Virtualization (NFV). In addition to providing six nines of platform availability , FlashArray also offers a true active-active metro stretched cluster for even more reliability and resiliency.

article thumbnail

Security Industry Association Names Scott Schafer as 2022 George R. Lippert Memorial Award Winner

Security Industry Association

He has served as a presenter at and helped shape SIA’s annual Securing New Ground conference, chaired SIA’s Membership Committee and participated actively in SIA’s events, networking offerings and legislative and advocacy initiatives. Scott Schafer sincerely cares about the health of the security industry.