Ixia leverages virtualisation to help enterprises ensure security resilience

Virtual edition of BreakingPoint security solution provides real-world, scalable application and threat simulation in an elastic deployment model.

Read More


NEWS

Red Hat and NEC collaborate

Red Hat, Inc. and NEC Corporation has announced a collaboration to jointly develop network functions virtualization (NFV) features in OpenStack in order to deliver carrier-grade NFV solutions with Red Hat Enterprise Linux OpenStack Platform.

Read More

NEWS

Actifio introduces Actifio One

Cloud-based service provides the fastest and easiest way to make applications available whenever and wherever they need to be.

Read More

NEWS

Guarantee is good news for Flash users

Tegile Systems has introduced the IntelliCare™ Flash 5 Guarantee, a multi-point program designed to give customers additional confidence in their Tegile storage purchase for the effective service life of their array.

Read More

Additions to the Syncro family

New models double throughput while delivering cost-effective shared storage and enterprise-level data protection to easily manage uptime.

Read More

Data leaders recognise the need for flexible, department-specific governance to navigate the...
New Lenovo system to provide 26.7 petaflops of computing power to Germany’s...
Integrates new & legacy resources into a unified, efficient, high-performance storage resource;...
Joint offer enables IT Professionals to overcome challenges associated with distributed...
The industry’s first searchable active archive leverages AI recognition to bring structure to...
HubStor's continuous backup helps organizations improve data protection for Microsoft Office 365 by...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more