Intelligent CIO North America Issue 10 | Page 43

FEATURE : NETWORK SECURITY

WE WERE LOOKING FOR A MORE ROBUST DATA PROTECTION TOOL SO

THAT OUR REMOTE USERS COULD SURVIVE ANY INCIDENT THAT MIGHT IMPACT PRODUCTIVITY .

For organizations that don ’ t have large cybersecurity teams , the ability to centrally administer the product with a low learning curve together with a number of compelling features makes Acronis a compelling cybersecurity solution .
How far would you say this solution has future-proofed your organization ?
While cybersecurity threats continue to evolve , we feel like the Acronis solution provides a key foundational level of protection that meets are current needs and can evolve with the changing needs of our business .
Did you experience any challenges during implementation ? If so , how were these resolved ?
We experienced very few issues during implementation . While the product overall is very user-friendly and administration is straight-forward , we had a few questions for Acronis support engineers on specific security needs in the area of single sign-on , handling of data encryption and user isolation of data . In the limited number of times we had to reach out to the Acronis engineers , we found them to be professional and very willing to address our Edge cases .
How do your staff find the technology ?
Our internal operations staff found the implementation straightforward and on-going administration to be a major strength of the product . One of the real advantages of the Acronis platform is the relatively low learning curve compared with other cybersecurity tools .
The single agent solution that provides multiple needs , data protection and cyber serves to consolidate several capabilities under a single intuitive and centrally managed platform . This capability allows our organization to reduce agent count and system overhead through the single agent solution , so as additional functionality is added into the platform , we anticipate realizing long-term benefits .
What advice would you offer other organizations looking to implement similar technology ?
Look for cybersecurity products that in addition to providing needed protection are relatively easy to install and administer . In today ’ s cybersecurity field , no one tool can meet all your needs , rather it requires a portfolio of products .
Be thoughtful in your selection so that your team has the capacity to fully leverage your cybersecurity products . Too often companies only take advantage of 50 % of the capabilities of a product due to available time or unnecessary complexity . Lastly , ensure that you document your use cases and requirements and test , test , test . Dedicate the time necessary to validate your use cases or risk a protracted rollout schedule . p
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 43