Fujitsu has announced its plans to deliver new storage appliances providing customers needing instant online access to large data volumes with a new hyper-scale, software-defined storage solution based on Intel® technologies and utilising Ceph open-source software.
Read MoreDell advocates the use of secure enterprise workspaces in BYOD environments to help organisations balance employee expectations, business goals, IT requirements and security needs. Today, a plethora of options exist for providing employees with the software and other enterprise resources needed to do their jobs. A secure workspace, however, is the most effective approach for accommodating employees’ needs for anywhere, anytime access to corporate data and resources while also elevating...
Read MoreWith the acquisition of BackupAgent, Acronis enables service providers to offer the most complete cloud backup solution to customers of any size.
Read MoreThe EU is to impose new data protection legislation to ensure better protection of the personal information of all EU citizens. The reforms will come with more severe fines for organisations that suffer data breaches. Peter Groucutt, managing director at Databarracks, claims that this is the tool IT professionals can use to drive-through security changes, as failure to do so will now result in severe repercussions: “Often, the fines imposed on organisations that suffer data breaches are...
Read MoreElitetele.com has introduced a suite of unified threat management (UTM) solutions, including next generation firewalls, for IT teams struggling to secure a rapidly-evolving IT landscape.
Read MoreTufin® is working with VMware® to extend Tufin’s Security Policy Orchestration capabilities through the VMware NSX™ network virtualization platform to provide security managers with a unified security policy experience with central management and automation. Through these interoperable solutions, customers will gain granular visibility and visualization of network security in software-defined data centers (SDDCs). With this combination, network micro-segmentation can be...
Read More