Governance gaps

Research reveals gaps in information governance practices as companies admit shortfalls in policies, and over reliance on individuals to manage their own information.

Read More


FireEye report reveals possible malware “Cyber Arms Dealer”

FireEye, Inc. has announced the release of a new report, Supply Chain Analysis: From Quartermaster to Sunshop. The report details how many seemingly unrelated cyber attacks may, in fact, be part of a broader offensive fueled by a shared development and logistics infrastructure — a finding that suggests some targets are facing a more organized menace than they realize.

Read More

High-performance Hadoop ETL in the cloud

Syncsort Ironcluster available for a free trial on the Amazon Web Services Marketplace.

Read More

Arbor Networks launches Arbor Cloud DDoS Protection Services

Enables ISPs to launch new or enhance existing cloud-based services. Introduces enterprise solution that integrates on-premise and in-cloud DDoS protection for best practice defense.

Read More

AMD enables Server APU software to reimagine the server

Showcases new generation of development tools that will help servers adapt to modern data center workloads at APU13 Developer Summit.

Read More

Protecting clients and reputation while reducing the cost of DR.
DataCore Software has published the findings of its eighth consecutive market survey, “Storage...
Acquisition accelerates HPE Storage’s transformation to a cloud-native, software-defined data...
Broad set of Veeam Ready solutions deliver multi-layered data protection, strengthen cybersecurity,...
HC3 Cloud Unity is designed to offer 100% infrastructure protection in event of planned and...
CloudCasa delivers enhanced cloud-native data protection, migration, and disaster recovery...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more