Mobile workspace solutions transforming the enterprise

Citrix has announced customers who are transforming their businesses with Citrix mobile workspace solutions, demonstrating how its virtualization, networking and cloud services technologies empower new ways for people to work better.

Read More

Cloud success depends on defined roadmap

A global leader in IT and Business Process outsourcing services has insisted that correct planning is vital for companies looking to adopt Cloud.

Read More


Counting the cost of ineffective business continuity

The Business Continuity Institute has published a report to highlight the cost of common threats to organizations, threats such as IT and telecommunications outage, data breach, cyber attacks and adverse weather conditions. 'Counting the cost – a meta analysis of the cost of ineffective business continuity' demonstrates why it is important for organizations to have a business continuity plan that can help prevent a drama from becoming a crisis.

Read More


Sicherheitsbericht von Dell SonicWALL: Bitcoin-Mining-Botnets breiten sich immer weiter aus

SonicWALL enttarnt Angriffsstrategien und verzeichnet zahlreiche Zero-Day-Schwachstellen --- Für 2014 ist eine Weiterentwicklung bei Exploit-Kits und Bitcoin-Mining-Botnets zu erwarten --- Der vollständige Sicherheitsbericht von Dell SonicWALL steht zum Download bereit

Read More

BridgeHead’s Independent Clinical Archive selected to consolidate, protect and share players'...
At the 16th Huawei Global Analyst Summit, Huawei held its IT Infrastructure Track.
SolarWinds has launched SolarWinds Backup for Office 365, designed to extend data protection...
Solution delivers automated QoS, alongside data reduction and more efficient backups.
Veritas Technologies, , in collaboration with Pure Storage, has introduced a new global effort to...
90% of sustainability program directors say companies cannot reach sustainability goals without...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more