GFI WebMonitor 2013 mit Web-Filterung für Laptops und Workstations außerhalb des Unternehmensnetzwerkes

GFI Software stellt die neueste Version seiner Web Security- und Filter-Lösung GFI WebMonitor 2013 vor. Mit der aktuellen Version können IT-Administratoren einen Roaming-Agenten für Web-Filterung auf Laptops und Workstations installieren

Read More


Hyve selects Corero’s First Line of Defense

Hyve, a leader in business hosting solutions, selected Corero’s First Line of Defense solution to safeguard its clients against Distributed Denial of Service (DDoS) attacks and other unwanted traffic to ensure availability.

Read More

Dot Hill AssuredSAN™ 4000 Series certified 'DataCore Ready' for SANsymphony-V

Dot Hill Systems Corp. has announced that its AssuredSAN™ 4000 series storage arrays are 'DataCore Ready' and provide full interoperability with the SANsymphony-V storage hypervisor from DataCore Software.

Read More

Veeam announces Veeam Explorer for Microsoft SharePoint

Veeam Software has announced Veeam Explorer for Microsoft SharePoint, a new capability that anyone may try out in an upcoming free public beta. Registration to participate in the public beta is now open.

Read More

Cohesity has launched Cohesity Orion 5.0, the industry’s first storage platform that combines...
British Antarctic Survey (BAS) is implementing Quantum Scalar® i3 tape libraries on the brand-new...
New no-charge licencing enables MSPs to offer cyber protection services on more endpoints based on...
Atos has signed a new four-year contract with French national meteorological service,...
Core DataCloud, a UK-based Cloud Service Provider, has selected the Infinidat Infinibox®...
The new SSDs’ sustained performance of 3.5GB/second for both reads and writes accelerates...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more