NEWS

CTERA adds Data Exfiltration Prevention

CTERA launches honeypot decoy capabilities to address data extortion and insider threats.

Read More

NEWS

Commvault acquires Appranix

Acquisition enables Commvault to solve a critical cyber resilience challenge facing enterprises today – rapidly rebuilding cloud applications after an outage or attack.

Read More

NEWS

Hitachi Vantara introduces Virtual Storage Platform One

Unbreakable hybrid cloud platform seamlessly integrates structured and unstructured data, redefining data management efficiency and flexibility for enterprises.

Read More

NEWS

Scality signs go-to-market distribution agreement with Ingram Micro

New alliance advances enterprise cyber resiliency with Scality ARTESCA immutable object storage software.

Read More

NEWS

Spectra Logic introduces LumOS Library Management Software

Next-generation LumOS software to power new TFinity Plus and Spectra Cube libraries.

Read More

NEWS

Wasabi Technologies introduces Wasabi AiR

The industry’s first searchable active archive leverages AI recognition to bring structure to unstructured data, enabling businesses to put their content to work.

Read More

N-able data reveals a related increase in backups among its partners, helping them become more...
Almost half of consumers believe their personal data has more value than physical items.
The first module of the exascale supercomputer JUPITER, named JEDI, is ranked first place in the...
Micron Technology says that Mobileye has selected the company’s memory solutions to advance...
More than 500 Dell storage portfolio software advancements improve intelligence, automation, data...
As mainframe modernization and hybrid cloud adoption takes on increasing importance, IT leaders...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more