SurveillanceDeep Video AnalyticsSecuritySurveillance Station
How we’re supercharging video surveillance in 2022
Simply listing the new features in Surveillance Station 9.0 belies the magnitude of improvements to our video surveillance suite. As we release the ninth iteration of one of our signature products, we are proud to say that users large and small will find securing their premises an altogether more pleasant and integrated experience. In Surveillance Station 9.0, everything is simply more within reach. An all-new experience When you first access the new Surveillance Station, what you’ll immediately notice is the sleek dark interface. Adopting many users’ preferred look is one small way we are making monitoring a better experience, but
NASActive InsightBackupHyper BackupSecure SignInSecurity
Try these new tools to protect your IT this holiday
Work pressure and irregular staffing make holiday seasons the perfect occasion for threat actors. Besides direct attacks on your infrastructure, phishing and other scams targeting employees also take a flight in the weeks before Christmas. Routine maintenance becomes difficult with fewer hands to do the job. Add working from home to the mix, and it looks like you (sysadmin, reboot consultant, designated IT person) will be holding the fort this holiday. Do you have other plans for your holidays? Luckily, so do we. That’s why we’ve worked on some tools to make large deployments easier to manage and easier to
NASCompatibilityHDDReliabilityStorageSynology NAS
In pursuit of reliability
A chain is only as strong as its weakest link One thing many people overlook in a storage system is how the actual drives that go into the system play a vital role in determining the overall dependability of the solution. At the same time, business environments also demand more. They require performance and predictability. Why we're introducing our HAT5300 enterprise hard drives Synology can control what components we use in our NAS. We also design and thoroughly test our DiskStation Manager (DSM) operating system and software ecosystem on our devices to ensure they work well together. But how do
NASData PrivacyEncryptionWeb Privacy
Data Privacy Day: one resolution for 2021
When it comes to keeping your personal information secure, don’t take anyone at their word — use encryption. Since the first Data Privacy Day back in 2007, online privacy threats have multiplied. On top of more traditional threats like phishing — which has been around since at least the early 1990s — users today face more sophisticated risks, including those linked to the widespread adoption of the Internet of Things (IoT). However, “older” threats remain highly relevant, as evidenced by a recent wave of ransomware attacks that not only lock user data but now have evolved to also threaten to leak
C2NASSynology 2021
The future for data management, hybrid-cloud, and more
Synology introduced an entirely redesigned DiskStation Manager (DSM) in the online event, 2021 AND BEYOND. DSM is the unified operating system powering Synology data management solutions, and version 7.0 brings new technologies for storage, backup, and hybrid cloud. "Unprecedented quantities of data have undergone processing, whether for data analytics, artificial intelligence, Internet of Things, telemedicine, or for countless more innovations. All of this is making a huge impact on our lifestyle and the way we do business, forming a "data economy" where owning more data gives you a competitive edge against others," said Philip Wong, Synology founder and Chief Executive
NASQLCSSDTLC
TLC vs. QLC SSDs: What are the differences?
We’ve talked about how we can use SSD cache to reduce latency and accelerate transfer speeds. We’ve also explained the differences between consumer and enterprise SSDs, and why for sustained performance reasons we suggest the latter. Consumer and enterprise SSDs are two broad categories that encompass a wide range of performance profiles. Due to differences in how vendors test and rate their products, buying based off advertised numbers is not enough. In today’s post, we’ll explore how NAND types affect performance significantly, and why this should matter to your next purchasing decision. NAND flash types NAND flash memory data is
NASDSMSecuritySynology NAS
10 security tips to keep your data safe
The past years have seen a dramatic escalation in cybersecurity threats. According to a report by The New York Times, more than 200,000 organizations were attacked with ransomware in 2019, a 41% rise from the year before. To help you protect yourself, we’ve compiled a list of important data security settings that are often overlooked. At the end we’ve included bonus tips that could help you ensure data integrity -- another pillar of data protection. Note: Most of the settings listed below can only be accessed and modified by a user account with administrative rights. Tip 1: Disable the default
NASRecapReliability
A quick look back at 2019
One of our most important goals in 2019 was “reliability.” To get there, we changed many of our internal development policies and methods. Let’s take a brief look back at what we did, and a sneak peek at what's coming in 2020. DSM We made eight releases1 in 2019, a significantly lower amount than in previous years. It isn’t a sign that we’re slowing down development but instead reflects our new focus on reliability. We adopted a slower update cadence to allow more time for additional rounds of internal testing. Stages a typical DSM update goes through: Automated In-Development Testing
NASRender FarmVirtualization
Building a 3D render farm with Synology
A robust, cost-efficient platform for 3D professionals “Storage used to play a secondary role in high-performance computing (HPC) environments, and yet it has a critical role to play in the field of cloud-based 3D rendering and image processing,” said Dr. Kuo, a researcher in the National Center for High-performance Computing (NCHC) in Taiwan. With the rise of 3D trends, high-end CPUs alone can no longer meet the demands of independent artists and production companies. 3D rendering requires more computing power from the GPU, along with massive storage and stronger throughput performance. Though the mission is to become an internationally renowned HPC center
C2EncryptionHyper Backup
Hyper Backup encryption technologies explained
How AES and RSA work together to protect C2 backup data You cannot be too careful when it comes to protecting your valuable assets. Suppose you have a collection of precious heirloom jewelry. You put it in a jewelry box with a lock to protect against theft. But it’s simply not safe enough, so you turn to a bank and store your jewels in a safe deposit box securely kept in a vault for extra protection and peace of mind. We value data confidentiality as much as you value your valuables. That’s why we employ AES-256 and RSA-2048 encryption technologies