Mobile security in the spotlight

63% of businesses do not attempt to manage corporate information on employee-owned devices; mobile security incidents cost more than $100,000 for almost half of firms surveyed.

Read More


Most data breaches caused by human and system errors

Symantec Corp. and the Ponemon Institute have released the 2013 Cost of Data Breach Study: Global Analysis which reveals human errors and system problems caused two-thirds of data breaches in 2012 and pushed the global average to $136 per record[1]. Issues included employee mishandling of confidential data, lack of system controls, and violations of industry and government regulations. Heavily regulated fields including healthcare, finance and pharmaceutical incurred breach costs 70 percent...

Read More

DDoS for the data centre

Juniper Networks has announced the availability of Junos® DDoS Secure to protect data centres against increasingly complex Distributed Denial of Service (DDoS) attacks. A key part of Juniper’s security portfolio, Junos DDoS Secure uses behavioral analytics and detailed network visibility to provide scalable protection against all major types of DDoS attacks.

Read More

Converged infrastructure choices from Dell

New solutions optimised for applications and workloads from branch office to scale-out data centre.

Read More


SharePlex 10.1.2 enables customers to move data in near real-time to MySQL and PostgreSQL.
Ootbi (Out-of-the-Box Immutability) now offers 192TB per node and up to 768TB per cluster, giving...
Qumulo, a pioneer of hybrid cloud storage, has launched its Data Migration Service.
Metallic adds new support for Salesforce backup, Microsoft Teams, Oracle Databases, Active...
According to a recent market report published, the virtual data rooms market was valued at US$...
Global technology provider Arrow Electronics is adding Metallic DMaaS (data...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more