By ticking this box, you are permitting Veritas Storage Ireland Limited and Veritas Technologies LLC (“Veritas”) as controllers of your personal data, to send you marketing communications by email.
You may require us to stop providing these communications at any time by amending your preferences here: https://www.veritas.com/form/preferences or by contacting the Privacy Team using the details given below. Should you make this request, we will retain your personal data to the extent necessary to ensure that your preferences are honoured, on the grounds of our legitimate interests in ensuring that we meet your request and comply with our obligations under data protection law. We will also remove your personal data if at any time we become aware that the contact details that we are using for this purpose are no longer valid. Your personal data will be transferred to systems in the United States and accessed and processed in India, as well as the UK and other countries in the European Union. Veritas uses data transfer agreements on the terms of the Standard Contractual Clauses approved by the European Commission to ensure these transfers are lawful.
For questions about your privacy, including to obtain copies of the Standard Contractual Clauses, please contact us by email at privacy@veritas.com, or by mail, care of the Legal Team, 350 Brook Drive, Green Park, Reading, Berkshire, RG2 6UH.
Individuals residing in Europe have rights in relation to their personal data, including the right to complain to their local Data Protection Authority. For more details of those rights please see the “Your Rights” section of our online privacy policy at www.veritas.com/privacy.
The ransomware threat is a top-of-mind issue for so many organizations; however, few feel totally prepared for an attack. Without an industry reference architecture or blueprint for ransomware protection, organizations are building their own strategies and processes to respond. But with ransomware protection included with so many different security and data protection solutions, many are confused about the scope of what is to be included, who is responsible for the implementation, and who needs to be involved in the conversation.
In order to connect the dots between those organizations that feel most prepared and the specific strategies and plans they are using to get there, with an eye on defining best practices, ESG surveyed 620 IT and cybersecurity professionals personally involved with the technology and processes associated with protecting against ransomware attacks at organizations in North America (US and Canada) and Western Europe (UK, France, and Germany).
Download the eBook to see the survey results and: