Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Verizon and IBM Launch Managed Data Protection Solution to NYC Customers

As businesses flock to cloud computing solutions, Verizon and IBM have teamed up to provide a secure enterprise information backup solution.

As businesses flock to cloud computing solutions, Verizon and IBM have teamed up to provide a secure enterprise information backup solution.

Available from both companies, “Managed Data Vault” is designed to automatically transfer data from a client location to a designed off-site data center over Verizon’s private network.

Many companies still transport their backup tapes by truck to an off-site location – a process that has resulted in several lost or misplaced tapes or drives, leading to data loss and leaks for several large organizations.

“Through this exclusive relationship with IBM we are meeting a void in the online data protection market,” said Kerry Bailey, chief marketing officer for Verizon Business. “We know that enterprise clients struggle with how to efficiently back up and restore data securely while mitigating the inherent risks such as loss of data. By working with IBM as part of our overall cloud strategy, we are bringing to market an innovative solution that will help our clients maintain the stability of their business.”

Don DeMarco, IBM vice president of Business Continuity and Resiliency Services, said: “Managed Data Vault offers a broad array of enterprise data protection, not just for files, but for very large data stores and transactional data base content. Today, enterprises have different ways to address specific scenarios. Managed Data vault is a single, secure solution to help clients retrieve a file, restore a device, or recover from a serious outage emergency.”

Initially available to Verizon and IBM clients in the New York City area, Managed Data Vault will address the needs of enterprise users with large data footprints and strict security and performance requirements, such as financial services and healthcare.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...