Disruption of critical public services or data compromise can cost people their privacy, their livelihoods and sometimes even their lives. What IT security threats do enterprises have to deal with today? Large Organizations Not Yet Able to Secure their Complex IT Environments
With more than 75% of enterprise security breaches due to external threat actors, how can organizations apply intelligence and automation to augment digital defenses? The State of Digital Defense
Be aware that all public cloud providers are not alike. The Critical First Steps Towards Leveraging the Public Cloud to Meet Electronically Stored Information (ESI) Compliance Regulations
Fixing bottleneck issues is crucial and requires first identifying the underperforming component. Five Common Application Bottlenecks and Recommended Resolutions
Data virtualization is fast emerging as an architectural approach to quickly gain control over sensitive customer information stored across multiple systems. Protected by Design - How Data Virtualization Can Reduce Data Privacy Risk
Promisingly, security features and protections in the major public cloud platforms (AWS, Azure and GCP) have come a long way. Managing Cloud Infrastructure to Prevent Security Gaps
Perhaps the most obvious advantage of VM-based solutions is that multiple VM tenants can execute code on the same physical hardware. Challenges of Using Virtual Machines As Cloud Storage

CEO CORNER

I am pleased to have an opportunity to share my thoughts on the importance of securing the digital identification and data of individuals, the enterpise, medical servivces, and finicial transactions in our rapidly growing mobile world....

Read More
IT Security

Chef Automate 2.0 accelerates enterprise ability to offer effortless infrastructure, enable high-velocity post-digital transformation

Chef, provider of continuous automation offerings, announced on Wednesday the next-generation automation platform, Chef Automate 2.0, that unifies infrastructure and applications work and enables enterprise organizations to rapidly and securely build, deploy and manage any application, legacy or modern, in any environment. Chef also announced availability of the new Chef Workstation, along with significant enhancements to Chef Application Automation (Habitat) and Chef Compliance Automation (InSpec). Chef Automate has been rebuilt […]

Cloud

Dynatrace releases Management Zones capability to automate insights for multi-team collaboration; provides access for microservices and containers at scale

Software intelligence company, Dynatrace, announced on Thursday Management Zones capability to provide software insights based on a user’s role and access rights. Dynatrace’s software intelligence platform collects performance related data across full-stack, dynamic multi-cloud environments so that organizations can ensure each user sees the information they need to improve their productivity without compromising security. Dynatrace’s Management Zones automatically discovers environment information from the orchestration layer and delivers built-in, dynamic permission-based […]

Hot Companies

Cool Products

Virtualization

Pure Storage debuts FlashArray//X, its shared accelerated storage platform that comes powered by NVMe and NVMe-oF

Pure Storage expanded on Wednesday its FlashArray product line to deliver cost-effective all-NVMe Shared Accelerated Storage for every workload. The new FlashArray//X family makes everything faster – databases, virtualized and containerized environments, test/dev initiatives and web-scale applications – at no additional cost over FlashArray//M, based on effective capacity. The all-NVMe FlashArray//X family features five configurations, from the NVMe-ready //X10 for small application deployments to the all-NVMe //X90, Pure’s densest, fastest […]

Data Backup

Syncsort improves security strategy with acquisition of Townsend Security’s IBM i data privacy products

Syncsort announced on Monday that it has signed a definitive agreement to acquire IBM i encryption, tokenization, authentication, FTP and SIEM integration products from Townsend Security, a Washington-state based provider of data privacy software. Additionally, the companies are announcing a partnership agreement for Syncsort to resell Townsend Security’s Alliance Key Manager product. Townsend Security’s Alliance Key Manager enterprise key management solution for IBM i, IBM z, Windows and Linux supports […]

Data Storage

New Jitterbit Harmony Summer ‘18 release boosts enterprise productivity with unified API and integration platform

Jitterbit, the API transformation company, announced on Wednesday new release of its enterprise iPaaS solution, Harmony Summer ‘18.  This release features support for the full range of integration personas – from citizen integrators to ad-hoc integrators to API developers – hundreds of new self-service recipes, certified GDPR compliance, support for the full API management lifecycle and a host of new connectivity upgrades, including iPaaS certified for SAP S/4HANA connectivity. The […]

Data Protection

InAuth improves its InAuthenticate two-factor authentication offering to help users address PSD2 compliance in EU

InAuth, a digital device intelligence company, announced on Thursday that it has enhanced its InAuthenticate solution to include malware, root and jailbreak detection and geolocation analysis with encrypted secure messaging. The new features will help businesses prepare for Payment Services Directive 2 (PSD2) compliance in the European Union as well as other scenarios that require a secure, second factor of authentication with a seamless customer experience. Leveraging InAuth’s Trusted Path […]

WWPI – Covering the best in IT since 1980