Disruption of critical public services or data compromise can cost people their privacy, their livelihoods and sometimes even their lives. What IT security threats do enterprises have to deal with today? Large Organizations Not Yet Able to Secure their Complex IT Environments
With more than 75% of enterprise security breaches due to external threat actors, how can organizations apply intelligence and automation to augment digital defenses? The State of Digital Defense
Be aware that all public cloud providers are not alike. The Critical First Steps Towards Leveraging the Public Cloud to Meet Electronically Stored Information (ESI) Compliance Regulations
Fixing bottleneck issues is crucial and requires first identifying the underperforming component. Five Common Application Bottlenecks and Recommended Resolutions
Data virtualization is fast emerging as an architectural approach to quickly gain control over sensitive customer information stored across multiple systems. Protected by Design - How Data Virtualization Can Reduce Data Privacy Risk
Promisingly, security features and protections in the major public cloud platforms (AWS, Azure and GCP) have come a long way. Managing Cloud Infrastructure to Prevent Security Gaps
Perhaps the most obvious advantage of VM-based solutions is that multiple VM tenants can execute code on the same physical hardware. Challenges of Using Virtual Machines As Cloud Storage


I am pleased to have an opportunity to share my thoughts on the importance of securing the digital identification and data of individuals, the enterpise, medical servivces, and finicial transactions in our rapidly growing mobile world....

Read More
IT Security

Kaspersky Lab highlights assessment corporate network penetration testing last year

Kaspersky Lab announced analysis of penetration tests on corporate networks which reveals that three-quarters (73 percent) of perimeter breaches in 2017 were achieved using vulnerable web applications. Every year, Kaspersky Lab’s Security Services department carries out a practical demonstration of possible attack scenarios to help organizations worldwide identify vulnerabilities in their networks and avoid financial, operational, and reputational damage. The aim of the penetration test report is to educate IT […]


Citrix and ServiceNow enhance workspace automation and employee experience to save time and improve productivity

In order to help organizations make the shift to people-centric computing by providing a workspace experience, Citrix announced on Monday availability of the Citrix IT Service Management Connector, certified by ServiceNow and now available in the ServiceNow Store. Citrix and ServiceNow have worked together to deliver this first of its kind solution. Citrix ITSM Connector reduces the time commonly associated with application and desktop provisioning, improving the experience ServiceNow ITSM […]

Hot Companies

Cool Products


AppOrbit and Google join to boost cloud migration with AppPorter 2.0, to transform and containerize legacy applications onto a Kubernetes-based hybrid cloud

AppOrbit and Google announced on Thursday a joint partnership to deliver Universal Application Modernization and Cloud Migration to enterprise customers. The partnership is focused on accelerating the digital transformation and systematically transitioning mission critical business and other applications into the Google Cloud Platform. With AppOrbit’s universal modernization platform, monolithic applications are de-stacked into containerized, cloud ready layers that can be composed directly into the Google Kubernetes Engine (GKE). AppOrbit is […]

Data Backup

StorageCraft introduces ShadowXafe, its next generation data protection offering for complete business continuity

StorageCraft introduced Monday ShadowXafe, an advanced next-generation data-protection solution that delivers recovery and workflow-optimized management simplicity. ShadowXafe is easy to deploy and manage, and it ensures secure data protection, less application downtime, and improved productivity. Designed for small and medium businesses (SMBs), ShadowXafe is simple to deploy, easy to manage and reliable even under the most demanding circumstances. It ensures SLA-driven data protection and delivers powerful recovery for physical and […]

Data Storage

CloudPassage introduces Halo Cloud Secure for continuous security of public cloud infrastructure; insight into IaaS security and compliance issues

CloudPassage, vendor of automated cloud security visibility, announced Monday general availability of Halo Cloud Secure, which offers comprehensive and continuous protection of public cloud infrastructure, delivering security and DevOps teams a “single pane of glass” view of security and compliance across all of their cloud service provider (CSP) accounts. Halo Cloud Secure delivers broad and deep coverage for AWS with a comprehensive library of policy checks and coverage that monitors […]

Data Protection

Cumulus Networks now supports platforms with Broadcom Trident 3 ASIC to deliver flexibility and ease of use

Cumulus Networks announced Monday expansion of commitment to open networking by introducing Cumulus Linux support for platforms with the new Broadcom Trident 3 (TD3) ASIC. The Cumulus Ethernet Virtual Private Network (EVPN) solution is the best EVPN for TD3, offering operational simplicity, undoing all complications of layer 2 connectivity, and freeing companies from reliance on proprietary controllers. With the Cumulus and Broadcom partnership EVPN operation are simplified, thus making it […]

WWPI – Covering the best in IT since 1980