NIS 2 and KRITIS: What Companies Need to Know
NIS 2 and KRITIS: What companies need to know NIS 2 (Network and Information Security Directive 2) and KRITIS (Critical Infrastructure Protection in Germany) are both regulatory frameworks designed to enhance the security and resilience of critical infrastructures, but they differ in scope, geographic focus, and specific requirements. Here’s a
How Does Cohesity Protect Organizations from Ransomware Attacks?
How Does Cohesity Protect Organizations from Ransomware Attacks? In an era where ransomware attacks have become increasingly sophisticated and frequent, organizations need robust solutions to safeguard their data. Cohesity which Cristie Data customers can benefit from within the Cristie READY program offers a comprehensive approach to protecting against ransomware by
How Does Cohesity Simplify Backup and Restore Processes?
How Does Cohesity Simplify Backup and Restore Processes? Cohesity Backup Solutions: Streamlining Your Backup and Restore Nightmares into a Manageable Dream In today’s data-driven world, safeguarding your information is paramount. Traditional backup solutions can be complex, time-consuming, and struggle to keep pace with ever-growing data volumes and cybersecurity demands. Here’s
What is the NIS2 Directive and why was it introduced?
NIS2: A Closer Look The Network and Information Systems Security Directive 2 (NIS2) is a European Union (EU) regulation aimed at strengthening cybersecurity across various sectors. It’s a successor to the original NIS Directive, which was introduced in 2016. Why was NIS2 introduced? The primary objective of NIS2 is to
How can Cristie Data help customers implement Cleanroom Recovery?
How can Cristie Data help customers implement Cleanroom Recovery? In our earlier article we covered the topic of Cleanroom Recovery at a high-level which has become a popular topic and sought-after feature to assist companies with cyber recovery following any confirmed or suspected cyber-attack. Today we talk to Christof Gedig,
Fast CrowdStrike Recovery should be a reality for Cristie Data customers
Fast CrowdStrike Recovery should be a reality for Cristie Data customers. Following the CrowdStrike bug that triggered a global IT outage on July 18th and 19th, 2024, CrowdStrike recovery has become a critical activity and focal point for many organizations. While the exact number of impacted users remains unknown, news
Cleanroom Recovery – A Safe Haven in the Storm of Cyberattacks
Cleanroom Recovery: A Safe Haven in the Storm of Cyberattacks Cyberattacks are a constant threat in today’s digital landscape. From ransomware that encrypts your data to malware that steals sensitive information, these attacks can cripple your business operations and cost you dearly. But there is a powerful tool at your
Why Data Sovereignty Matters for Germany’s Digital Future
Why Data Sovereignty Matters for Germany’s Digital Future This month we met with Christof Gedig, CTO at Cristie to ask why sovereign cloud is an ongoing hot topic, and what is means for companies in Germany. Q: What is a sovereign cloud why is it important for data protection strategy?
Cristie Data GmbH: Your Partner for HPC Data Backup & Archive
Cristie Data GmbH: Your Partner for HPC Data Backup & Archive The High-Performance Computing (HPC) sector generates unprecedented amounts of data critical to scientific research, engineering simulations, and cutting-edge technological development. This data is as vast as it is valuable, and effective backup and archiving strategies are not just an
The IBM TS1170: A Game-Changer for HPC Data Storage
The IBM TS1170: A Game-Changer for HPC Data Storage In 2023, IBM and Fujifilm made a significant breakthrough in data storage technology with the release of the IBM TS1170 tape drive and its compatible 3592 JF tape cartridges. This innovation offers game-changing advantages for High-Performance Computing (HPC) users, addressing the
Have you heard of CO2 neutral data protection?
Have you heard of CO2 neutral data protection? Data centers consume vast amounts of electricity for servers, cooling, and infrastructure, with most receiving their power from traditional sources such as nuclear, coal or gas. This is not just old-fashioned; it also emits a huge amount of CO2 which causes climate
The Cybersecurity Crisis in Healthcare: Germany Under Attack
The Cybersecurity Crisis in Healthcare: Germany Under Attack The healthcare sector has become a prime target for cybercriminals in recent years. The sensitive nature of health data, often coupled with outdated legacy systems and limited cybersecurity budgets, makes healthcare institutions vulnerable targets. Germany has seen a surge in cyberattacks targeting
Outsourcing Cybersecurity: Why Companies Are Turning to the Experts
Outsourcing Cybersecurity: Why Companies Are Turning to the Experts In today’s rapidly evolving digital landscape, cybersecurity stands as one of the most critical and complex challenges organizations of all sizes face. The growing sophistication of cyberattacks, the ever-present risk of data breaches, and increasingly stringent compliance regulations place tremendous pressure
Is your “cold data” burning a hole in your pocket and the environment?
Is your “cold data” burning a hole in your pocket and the environment? This week we caught up with our CTO Christof Gedig who had just returned from a visit to our windfarm data center facilities in partnership with windCORES and undertook a short Q&A session regarding the environmental and
Green IT: Why Tape Storage is a Sustainable Champion for Your Data
Green IT: Why Tape Storage is a Sustainable Champion for Your Data In today’s data-driven world, businesses are constantly accumulating information. This digital surge necessitates robust storage solutions, but traditional methods can come at a significant environmental cost. Here’s where tape storage emerges as a surprising champion for sustainability. The
Understanding S3 Object Storage: A Powerhouse for Data Security and Protection
Understanding S3 Object Storage: A Powerhouse for Data Security and Protection Amazon’s Simple Storage Service (S3) has become a cornerstone of cloud-based data storage. But how does S3 work, and why is it particularly advantageous from a cybersecurity and data protection standpoint? Let’s dive into the details. Object Storage vs.
What pieces are missing from your DR plan? Part 2
What pieces are missing from your DR plan? Part 2. Cristie Data can help to solve the challenges of physical server recovery at scale. Our recovery software can seamlessly add automated full physical system recovery to leading backup solutions from Rubrik, Cohesity, Dell Technologies and IBM. Do you have an
What pieces are missing from your DR plan? Part 1.
What pieces are missing from your DR plan? Part 1. Cristie Data can solve one of most overlooked aspects of disaster recovery, SaaS service data backup. We offer solutions to protect productivity services such as Microsoft 365, Salesforce®, Dynamics 365, Azure Active Directory & Virtual Machines and Google Workspace. Many
Simplifying migration from VMware
Simplifying migration from VMware Cristie Data provides a seamless transition for customers who want to switch from VMware to an alternative platform. Although VMware has dominated virtualization and hyperconverged infrastructure technologies, leading analyst firm, Forrester, forecasts that 20 percent of VMware’s current customers will explore other options during 2024. Easily
Simplifying System Migration to Microsoft Azure Stack HCI
Migrate Multiple Systems to Microsoft Azure Stack HCI with the Cristie Virtual Appliance The migration of multiple systems to Azure Stack HCI has until now proven to be a time-consuming task for systems administrators within the IT community due to a lack of automation tools. Cristie has solved the challenges
Cristie Data – Solving DORA Operational Resilience challenges for the Insurance Sector.
Solving DORA Operational Resilience challenges for the Insurance Sector. Cristie Data work with many financial sector organizations to deliver data and cyber security solutions which address the operational resilience challenges of the Digital Operational Resilience Act (DORA). Although major financial institutions have received the most rigorous attention, other financial entities
What are the most important tools to combat an unexpected cyberattack?
What are the most important tools to combat an unexpected cyberattack? Protecting your critical business data from cyber threats is more important now than ever. With the rise of ransomware and other cyberattacks, it could be time to address your cybersecurity balance. It is common for companies to invest heavily
LTO Ultrium Tape Storage – The ultimate choice for capacity, security, and sustainability
LTO Ultrium Tape Storage – The ultimate choice for capacity, security, and sustainability. Tape storage has been declared dead for well over a decade by many IT vendors and industry analysts. These claims regarding the end of tape, however, have been considerably overblown. Tape storage is amid a renaissance driven
Simplifying Digital Operational Resilience for the EU Financial Sector
Simplifying Digital Operational Resilience for the EU Financial Sector. Everyday activities of the financial sector are supported by complex Information and communication technology (ICT) systems supporting the introduction of many new digital services that enhance customer experience, increase the efficiencies of internal process, but at the same time introduce additional
Secondary backup for Rubrik – the final component of zero trust data security.
Secondary backup for Rubrik – the final component of zero trust data security. It is becoming increasing important for companies to protect data against cyber threats. If your data is totally secure your business should be unstoppable. Having a secure zero-trust data management system such as Rubrik backup is fundamental
READY by Cristie, the new way to beat cybercrime.
Expect the Unexpected. Ransomware reaches all organizations. No organization is exempt from cybercrime. Ransomware attacks reach the periphery of every organization daily. Network breaches are sometimes stopped by the investments in cybersecurity that have been set in place. Attacks based on social engineering such as phishing attempts and malicious file
Ransomware detection and enhanced recovery now included in the Cristie Software recovery and replication portfolio
Early ransomware detection incorporated into your system recovery process. When cybercriminals orchestrate a human led cyberattack, they may have spent months identifying and overcoming defences to maximise the impact of their attack. Regardless of whether their entry was through commodity malware, or the exploitation of an outdated or misconfigured web
The Misconception surrounding Cloud Service Data Protection
Cloud Services are vulnerable to outage, and Data Protection is the customer’s responsibility. On January 25, 2023, a global network outage hit Microsoft affecting users of Teams, Azure, Outlook, SharePoint and Xbox Live. Social media was overwhelmed with users venting anger at not being able to send or receive emails
Introducing the Cristie IBM Champions of 2023
Introducing the Cristie IBM Champions of 2023. Cristie Data GmbH possess a long history supporting IBM solutions having been a recognized IBM solution partner since 2002 with several certified experts and specialists on the team. Similarly, Cristie Nordic are an IBM Gold Business Partner and have been an IBM Competency
Introducing Rubrik Cyber Recovery
Introducing Rubrik® Cyber Recovery According to a recent Bitkom study the German economy suffers annual damage of around 203 billion euros due to theft of data, sabotage, espionage, and the theft of IT equipment. This is the result from a 2022 study of more than 1,000 German companies covering different