IFSEC SA 2015 focuses on retaining data securely

November 2014 Security Services & Risk Management, Information Security

Data storage and recovery has become big business as companies realise the true cost of losing all their strategic data to carelessness, fire or theft. Enterprise Strategy Group research indicates that primary storage is growing by nearly 40% annually, but overall IT spending and storage-specific spending are growing at nowhere close to that rate.

According to searchdatabackup.com, IT professionals are being forced to store data more effectively, while also increasing the types of protection and recovery capabilities. It continues that at first glance, those two trends might appear contradictory; but in fact the synergies between them are driving the most exciting parts of how IT is evolving from a backup mentality to a data protection strategy – including not only backups, but snapshots and replication, as well.

Finding the right company to provide this critical service is sometimes a minefield. “Let’s be honest, how do you know that the company you employ to store your data won’t lose or corrupt it? Sadly, many businesses only realise that their data is no longer secure once it is no longer available. The only way to provide the level of comfort required in a data storage and/or backup service provider is to reference the provider’s current client base. In addition, the service provider should be able to design a customised solution that takes your specific business systems and practices into consideration,” says Joshua Low, IFSEC SA event director at IFSEC SA show organiser UBM Montgomery.

IFSEC SA 2015, being held between 12 and 14 May at the Gallagher Convention Centre, provides a platform for exhibitors to discuss end-to-end data storage and backup solutions with a captive audience.

According to SearchStorage, storage inefficiency is caused by the deployment of isolated islands of underused and over provisioned storage which, in turn, produces high costs and reduced performance. To address poor data storage efficiency, administrators need to analyse and resolve its root causes.

They highlight three key factors when searching for inefficiencies in your storage systems: Knowing what data you have and how it is hosted; implementing a unified management capability that can integrate configuration details and operational status information into a single hardware monitoring and management system, if your environment has two or more storage arrays; using only disk, or only disk and solid-state, can make storage infrastructure more expensive over time, while introducing tape or the cloud as a Tier 3 can cut storage infrastructure costs by half.

GeoVision has a number of products available for data storage and backup including the GV-Backup centre program, which provides users with a secure and affordable remote backup solution for the GV-System, and GV-IP Devices. The GV-Backup centre can automatically store a copy of recordings and logs to the offsite location. If a disaster strikes where the GV-System and GV-IP Devices are located, the recording data remain safe in a different location.

Figure 1. GV-Hot swap backup centre
Figure 1. GV-Hot swap backup centre

The GV-Hot swap backup centre system, designed for large-scale video surveillance deployments, provides a secure remote backup solution with a powerful data storage capacity for the GV-System and GV-IP Devices. It comes with a selection of 4U (20-bay) or 3U (16/8-bay) hot-swappable SATA mobile racks. Depending on the HDD size, the GV-Hot swap backup centre system can store more than 60 terabytes of recorded data.

The GV-Redundant server is a video backup server designed for large-scale video surveillance deployments. It can record up to 128 IP channels of the connected GV-System hosts. It keeps an extra copy of IP channels from GV-System hosts.

GV-Failover server is a video backup server that records up to 128 IP streams from host GV-Systems when any of the following conditions occur: when the host GV-System starts up without monitoring; when file recycling fails; when there is an error in the hard drive; or when there is an error with the failover plug-in program.

“IFSEC SA 2015 will bring together specialists in the fields of security and fire who are able to assist risk and security managers, as well as other business consumers, in providing a cost-effective and efficient, future-proofed solution. We have already signed up a number of exhibitors who specialise in the data storage and backup arena and we invite other suppliers and manufacturers to contact us to discuss how we can build their brand,” Low concludes.

With 60% floor space sold, space can be booked through Sven Riddle on +27 (0)10 003 3077 or email [email protected]. Visit the IFSEC SA 2015 website on www.ifsecsa.com for further information on the exhibition.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
FICA in the era of deepfake and AI-driven fraud
Security Services & Risk Management
A growing fraud strategy involves leveraging AI to produce highly convincing fake images, videos, and audio, commonly referred to as deepfakes, which are used to impersonate real individuals and spread misleading or false information.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.