View articles by tag/topic
Latest blog

The evolution of data management: Key trends for 2025 and beyond
As we head into a new year, organizations face increasing pressures to manage their data effectively and responsibly while delivering rapid innovation, in a technology landscape undergoing seismic change driven by AI and cloud computing. In 2025, we predict that several key trends will drastically influence the data management sector, driven by global legislation, security…

2024 in Review: Navigating the Shifting Data Landscape
2024 has been a pivotal year for data, marked by exponential growth, heightened security concerns and an evolving regulatory environment. This year’s data landscape is defined by continued acceleration of cloud adoption, the increasing power of AI and a growing awareness of the critical need for robust data governance. In this post we’ll explore the…

Introducing Enterprise Recon Cloud: Now on AWS Marketplace
Today marks the launch of our latest offering, Enterprise Recon Cloud, now available via AWS Marketplace. Enterprise Recon Cloud offers the award-winning data discovery and data management capabilities of Enterprise Recon, packaged for cloud-first organizations. It offers a new way for customers to leverage the power of Enterprise Recon without the need for additional hardware…

Addressing data security and privacy in transportation and logistics
The transportation and logistics sector is increasingly turning to digital technologies to enhance operational efficiency and customer service. This shift towards a digital-centric approach is not without its challenges, particularly when it comes to ensuring the security and privacy of vast amounts of data. In 2023, the transport sector reported more than double the number…

A panel discussion: The changing landscape of cybersecurity
Stephen Cavey, co-founder and chief evangelist of Ground Labs, joined a panel of senior leaders at the recent e-Crime & Cybersecurity Mid-Year Summit event hosted by AKJ Associates. The panel, consisting of security and data protection leaders from the retail, sport, technology, and banking sectors, tackled a wide range of current challenges faced by CISOs…

How to achieve effective data discovery: The four essential elements
In this post we’ll explain the four essential elements of an effective data discovery program. The most effective data discovery programs are: Specific — targeting well-defined data types Comprehensive — cover a broad scope of systems and file types Evidence-based — use a sensitive data discovery tool capable of producing consistent, reliable results Repeatable —…

Why your critical data is (probably) not fully secure
Every organization has data without which they can’t operate. It’s crucial that organizations are able to identify and protect this critical data to secure their ability to function as a business. In this post, we’ll explain why this matters, as well as some of the ways that this essential data may be at risk and…

Data is the heart of zero trust
Organizations today manage increasingly fragmented environments, distributed across on-premises, third-party hosted and cloud-based environments and services. These diverse networks mean organizations can no longer depend on a hardened perimeter to protect them from cyber-attack. Zero-trust architectures provide an alternative approach to cybersecurity by focusing on identifying and protecting critical resources — data, applications, assets and services…

Managing data growth — How much data do you really need?
Data is the heart of modern business. It’s used to drive decision-making, develop products and services, evaluate performance and to deliver customers an experience that keeps them loyal. A recent survey found that enterprise organizations experienced a 63% growth in data volume each month, storing around 2.02PB across local, managed and cloud-hosted storage locations. While…

Data discovery for AWS
In this post we’ll be discussing the importance of performing regular data discovery for AWS storage across the different storage types available. The agility and flexibility of networking and storage offered by services such as Amazon’s AWS are hugely attractive to businesses. However, numerous data breaches have been reported resulting from insecure S3 storage buckets…