Insider threats and employee-owned devices identified as the greatest risks

New findings from network security management provider AlgoSec also indicate poor change management processes lead to network and application outages.

Read More

Belief in security breaches

A survey conducted recently by Lieberman Software Corporation reveals that more than 70% of IT security professionals would not be willing to bet $100 of their own money that their organization will not suffer a data breach in the next six months.

Read More

Self-service

Advancing the enablement of user-oriented IT, LANDesk Software has announced the release of LANDesk Service Desk 7.6.

Read More

LSI and Nebula team up

Companies working together to bring scalable storage solutions to OpenStack environments.

Read More

Truth and lies about latency in the Cloud

By Jelle Frank Van Der Swet, who manages the pan-European marketing and product development programme for Interxion’s sizeable and fast-growing cloud community.

Read More

SUSE adds new channel program for SAP Business One, version for SAP HANA®

SUSE and SAP channel partners to help small and midsized enterprises use real-time business insight affordably.

Read More

Beyond scientific and industrial workflows, NVIDIA Omniverse lets the designers, builders and...
Fujitsu Laboratories Ltd. has launched three collaborative research projects with world-leading...
The new SSDs’ sustained performance of 3.5GB/second for both reads and writes accelerates...
Research highlights gap between companies’ aspirations to modernize and a lack of maturity...
New research reveals impact of stress on behaviour, relationships and health.
Pure Storage Platform crucial to developing innovation and growth.
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more