Learn How Alliance Can Help With Your Data Archiving Requirements


 Alliance’s Data Archive Solutions makes regulatory compliance, data security, infrastructure optimization, and cost reductions Simple.


Data Storage Solutions – How to Reduce Costs with a Data Archiving Tier

In this FREE Report you’ll learn the key steps for transitioning to a tiered storage environment plus you’ll learn how to:

  • Identify which data to archive;
  • Make the transition seamless for the end user;
  • Select the correct data archive for your business;
  • And so much more...

Name(*)
Invalid Input

Email(*)
Invalid Input

Free Whitepaper

TOP REASONS YOU NEED
TO ENCRYPT YOUR DATA


 


sevenLost or Stolen Devices

There are a lot of ways these devices can disappear: accidental loss, malicious employees, lack of tracking, etc. According to hhs.gov, since September 2009, there have been 646 breaches impacting 500 or more individuals. More than half of the incidents involved lost or stolen unencrypted devices.

The headlines are out there:

  • Four McLean Hospital backup data tapes go missing, thousands affected - four unencrypted backup data tapes went missing.
  • UK Insurer (Royal Sun Alliance) loses portable storage device from data center with sensitive customer data.
  • Employee with California bank puts customer loan data at risk - An employee handled mortgage loan files stored on a removable disk drive in a manner contrary to the bank's policies and instructions
  • California dentist announces theft of server containing patient information – (office burglary)
  • Data at risk following burglary at Liberty Tax Service office in California - Computer towers containing the personal information were stolen during a burglary
  • Advocate Medical Breach - four unencrypted computers stolen during an office burglary

sixYou may incur many additional expenses including the cost of reissuing cards to customers

If the breach involves credit card information, the cost of reissuing cards can likely fall to you. According to a Bank Technology News article, the cost of creating and mailing a new debit card for a small community bank under $1B in assets is around $11. Larger banks have economy of scale on their side, which brings the cost down to $2.70. Reissuing credit cards ranges from $12.75 to $2.99 for the larger banks.

  • On top of the $25M AT &T settlement, the company was ordered to:
    • Develop and implement a comprehensive compliance plan
    • Conduct a privacy risk assessment
    • Implement an information security program
    • Prepare a compliance manual
    • Provide employees with regular training on privacy law and the company's privacy policies
    • Appoint a senior compliance manager who is privacy certified
    • Notify all affected customers and provide them with free credit monitoring services
  • Target Corp. agreed to reimburse thousands of financial institutions as much as $67 million for costs incurred from a massive 2013 data breach

fiveYou could face potential lawsuits by individual customers in the event of a breach

A breach of personal information can be very damaging to customers. Suits can range from large class action to individual breach victims. Plaintiffs can seek damages for damage to credit, costs of credit and/or identity theft monitoring, costs of card replacement, risk of future harm, emotional distress, fraudulent purchases, and more. Example:

  • A law firm has initiated a class action lawsuit against Home Depot for the exposure of 56 Million debit and credit card numbers. According to a New York Times interview with former security employees of the company, Home Depot security allegedly relied on outdated software to secure its systems.

fourYou may incur the costs of a forensic investigation conducted by an independent agency

Determining how the breach occurred, who was responsible, and what technology, electronic systems, and processes were involved will require analysis. Depending upon your industry, or simply for the reassurance of your customers, you may be required to secure these services from independent agencies. Most regulatory bodies will require a full justification of how the breach occurred and what actions were taken to remedy the situation. This can be quite costly, particularly to a small business. Example:

  • Homebridge retained a data forensics and cybersecurity firm to assist in investigating the incident after valuable human resource records were accessed and used to file fraudulent tax returns.
  • HITRUST, a data security organization, paid for an independent security assessment program for associates of five insurance plans and pharmacy chains after their systems were hacked expositing 111 health records.

threeSmall businesses are potential targets

Small business typically do not have the resources of large companies or dedicated professionals to handle network issues and subsequently fall prey to hackers, cyber attacks and other data breaches.

  • Business News Daily reports “ that small businesses fall into hackers' cybersecurity ‘sweet spot’. They have more digital assets to target than an individual consumer has, but less security than a larger enterprise.”
  • Symantec’s Internet Security Threat Report 2013 reports that In 2012, 50 percent of all targeted attacks were aimed at businesses with fewer than 2,500 employees.
  • The National Small Business Association Technology Report indicates that in 2013, 44% of small businesses reported having been attacked with an average cost of $8,700.

twoYou can experience damage to your business reputation

A breach does not just damage large businesses with known brands. Small firms, doctor and dental offices, and corner markets equally can experience reputation and brand damage due to data loss or breach.

The Ponemon Institute conducted a survey of nearly 850 executives, found that the average time it takes to restore an organization's reputation is one year. Do you have a year to devote to recovering from damage to your reputation? Wouldn’t it be much easier just to encrypt your data?

A research study commissioned by Semafone® indicates that the majority of people surveyed would not do business with a company that had failed to protect its customers’ credit card data. 86.55% of 2,000 respondents stated that they were “not at all likely” or “not very likely” to do business with an organization that had suffered a data breach involving credit or debit card details.

AND THE #1 REASON...

one$ $$ Fines and Penalties – Need we say more?

Pay now or pay later. Encryption is far less expensive than a data breach. The list of businesses and organizations that have had to pay fines and penalties due to a data breach is becoming endless and the fines are staggering.
Here are just a few:

  • Target: the firm's latest earnings report indicates that the net expense of the breach stands at $162 million. The actual total has now reached a gross expense of $191 million.
  • AT & T: $25 Million
  • Anthem: $1.7 Million

Healthcare faces the greatest penalties here are some from the hhs.gov website:

  • Parkview Health System, Inc. (Parkview) will pay $800,000 and adopt a corrective action plan to correct deficiencies in its HIPAA compliance program.
  • New York and Presbyterian Hospital (NYP) has agreed to pay OCR $3.3Mil to settle potential HIPAA violations
  • Idaho State University (ISU) has agreed to pay $400,000 to the U.S. Department of Health Human Services (HHS) for violations
  • Phoenix Cardiac Surgery, P.C., of Phoenix and Prescott, AZ, has agreed to pay the U.S. Department of Health and Human Services a $100,000 settlement

Special Promotions


Periodically, Alliance Storage Technologies, Inc. (Alliance), offers special promotions that can save you valuable business dollars!

Bookmark this page and check back periodically to take advantage of these great promotions!

For immediate attention contact: Alliance Sales 719.593.4425

Current Promotions

IBM 3995 Optical Library Upgrade and Services Program

HP Optical Jukebox Support Promotion

Upgrades and Expansions

Upgrade & Expansion Paths for Magneto Optical (MO) Customers

 

ASTI Can Help Support Your IBM 3995 with an Upgrade and Services Program


IBM support for the 3995 Optical Library has ended. Are you prepared?

IBM‘s end-of-service on the 3995 systems occurred on December 2010 making it essential to secure a supported storage solution for your critical data. The IBM 3995 Upgrade and Services Program makes it easy for you to transition to new, supported optical libraries.

Now you can retain your current media without the pain of migrating to a disk-based solution. In addition, you can even trade in legacy systems and receive a discount on a new ASTI library, providing even greater savings and the most cost-effective long-term archival solution.

  • Take Away the Pain of Data Migrations - Both ASTI and IBM libraries use MO (Magneto-optical) media making it possible to move current media to new systems without the complications and risks of data migration. We can help you easily transition to a new library.
  • Stay Happy on Optical Technology - You already know the benefits of optical storage technology. Continue to trust optical technology for critical data and continue to enjoy a positive ROI through long-term use.
  • Retain Your Existing Data and Media - ASTI G-Series libraries will support IBM media with backwards read compatibility so you can keep critical data on the media you trust for long-term reliability.
  • Scalable Long-Term Solutions  - Our libraries offer the ultimate in investment protection. With capacities from 220GB up to 76TB, our libraries are scalable to meet your capacity needs.
  • Most Cost-Efficient Solution - Green technology libraries offer lower TCO than other types of data storage devices. After the data is permanently written on the media, it no longer requires a constant power source to maintain the data. This feature potentially reduces operating costs up to 75% (power and cooling), significantly lowering the total cost of ownership.
  • Solutions include Best-In-Class Global Services - You can be assured that you will receive the very best in world-wide, on-site maintenance services for new optical libraries through ASTI Service Direct programs and our authorized global service partner network.
  • Full-Service Resource Provider - As a full-service provider, ASTI manufactures libraries, drives, media and parts for all current ASTI / Plasmon® product lines. Whether it’s ongoing system maintenance and support, product upgrades, software updates, parts, or authentic UDO™ media – ASTI is the single-source you need.

Yes I want to learn more: Click to download the IBM 3995 Promotion brochure or fill out the Contact form to the right.

What are my options?

Options

Move the MO Media to ASTI Libraries
Purchase ASTI G-Series libraries that will support MO media with backwards read compatibility so you can keep critical data on the media you trust.

  • Protects your investment in MO media
  • Backwards compatibility provides investment protection
  • Move to up-to-date technology and continue using the same media

Select an ASTI Library with Mixed Drives (MO and UDO™)
Reads and writes data on two different media types quickly and easily within one library. This option removes the pain and risk of migrating data to a new solution.

  • Read legacy MO media and write to new UDO™ media
  • Allows you to transition to UDO™ higher capacity media
  • Move to up-to-date technology and continue using the same media
  • Dual media offers investment protection

Upgrade to a UDO™ Archive Appliance and Gain the Benefit of an All-In-One Networked Attached Storage (NAS) Solution

  • You can begin storing valuable data on expandable, scalable systems. Meets current regulatory requirements for data archiving
  • Allows you to migrate data one time instead of the many required with tape and disk solutions
  • Higher capacity drives
  • RAID cache provides faster throughput

ASTI technical sales staff are on hand to answer questions. Terms and conditions apply. Contact 719.593.7900, or fill out the form the the right for additional information. 

A Few Words from Our Customers...

Our Data Survived Hurricane Katrina

“We had to determine what information was retrievable among the absolute chaos of the first week after Katrina…We were able to recover all of the patient images off the Plasmon libraries…We are now primarily using the Plasmon’s UDO Archive Appliance for its long-term recoverability.” 
--Kenneth Allen, Health Systems Specialist, Southeast Louisiana Veterans Health Care

HIPAA Compliance at a Reasonable Cost

“Ensuring that we could provide a PACS archive solution that helps customers meet HIPAA compliance at a reasonable cost was a critical requirement. This was guaranteed with the performance, longevity, and authenticity of the UDO Archive Appliance.”
– Lenny Reznik, Director Enterprise Imaging and Information, Agfa Healthcare

Retrieval Time Went from Days to Seconds

“Our major issue was time lost chasing documents. With the implementation of the archive solution, retrieval times went from DAYS to SECONDS.”

--Tony Libri, Sangamon County Circuit Clerk, Sangamon County Ciruit Clerk's Office

 

Login