Remove Application Remove Backup Remove Malware Remove Retail
article thumbnail

8 Considerations for Retailers Investing in AI-powered Video Surveillance

Pure Storage

8 Considerations for Retailers Investing in AI-powered Video Surveillance by Pure Storage Blog One might think retailers started the new year feeling festive after wrapping up a robust 2023 holiday shopping season. But a concurrent trend—rising retail shrink—is eroding retailers’ profitability and feelings of good cheer.

Retail 122
article thumbnail

Retailers Must Use SaaS Safely to Protect their Bottom Line

Solutions Review

In this feature, Zerto ‘s Global Director of Technical Product Marketing Kevin Cole offers commentary on why retailers must use SaaS safely to protect the bottom line. The retail industry is one of the largest users of business-to-business technologies like SaaS. For retailers in particular, a data breach can be extremely costly.

Retail 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Four Key Backup and Recovery Questions IT Must Ask During Deployment

Solutions Review

In this submission, Skytap Technical Product Evangelist Matthew Romero offers four key backup and recovery questions that IT teams must ask during deployment. There are a number of ways a robust DR/backup system can mitigate the harm of a ransomware attack. Setting up backups for a core business application is a complicated task.

Backup 105
article thumbnail

Guest Post: Cybersecurity Incidents Lead to New Standards, Requirements

Security Industry Association

Because the traditional security industry relies on a multitiered model where many products go from manufacturer to distributor to security integrator to end user, manufacturers often are unaware of the final destinations of – and applications for – their products. Many cybersecurity standards in the U.S. and parts of Europe.

article thumbnail

33 Data Privacy Week Comments from Industry Experts in 2023

Solutions Review

While no single checklist will suit every company, solid data privacy management incorporates access control, cybersecurity planning, device security, end-user training, ongoing updates, strong password policies, secure communications, data backup, and ongoing review with nimble adjustments as needed.