Disruption of critical public services or data compromise can cost people their privacy, their livelihoods and sometimes even their lives. What IT security threats do enterprises have to deal with today? Large Organizations Not Yet Able to Secure their Complex IT Environments
With more than 75% of enterprise security breaches due to external threat actors, how can organizations apply intelligence and automation to augment digital defenses? The State of Digital Defense
Be aware that all public cloud providers are not alike. The Critical First Steps Towards Leveraging the Public Cloud to Meet Electronically Stored Information (ESI) Compliance Regulations
Fixing bottleneck issues is crucial and requires first identifying the underperforming component. Five Common Application Bottlenecks and Recommended Resolutions
Data virtualization is fast emerging as an architectural approach to quickly gain control over sensitive customer information stored across multiple systems. Protected by Design - How Data Virtualization Can Reduce Data Privacy Risk
Promisingly, security features and protections in the major public cloud platforms (AWS, Azure and GCP) have come a long way. Managing Cloud Infrastructure to Prevent Security Gaps
Perhaps the most obvious advantage of VM-based solutions is that multiple VM tenants can execute code on the same physical hardware. Challenges of Using Virtual Machines As Cloud Storage


I am pleased to have an opportunity to share my thoughts on the importance of securing the digital identification and data of individuals, the enterpise, medical servivces, and finicial transactions in our rapidly growing mobile world....

Read More
IT Security

NeuVector, Alibaba Cloud align to improve Kubernetes security for enterprise users

NeuVector and Alibaba Cloud, the cloud computing arm of Alibaba Group, announced on Monday a new partnership to strengthen Kubernetes security for enterprise customers. Alibaba Cloud has recently launched its Container Service for Kubernetes to help users deploy containers more easily and securely, and the service is now utilizing NeuVector’s technology to provide specialized security for Kubernetes containers. Alibaba Cloud’s Container Service for Kubernetes is a fully-managed solution that enables […]


Ampere releases eMAG for hyperscale cloud computing; partners with Lenovo to deliver Ampere eMAG server platform

Ampere, which is developing an Arm-based server platform for the future of hyperscale cloud and edge computing, announced availability of its initial generation Armv8-A 64-bit processors for data centers. Already selected by Lenovo and several ODMs, the Ampere eMAG processors deliver improved total cost of ownership (TCO) value, high-performance compute, high memory capacity, and rich I/O to address cloud workloads including big data, web tier and in-memory databases. Ampere also […]

Hot Companies

Cool Products


Turbonomic boost Microsoft partnership; debuts public cloud assessment and migration capabilities for Azure

Turbonomic announced this week capabilities that help customers accelerate cloud migration and optimize workloads in Microsoft Azure environments. New Reserved Instance (RI) purchasing capabilities for Microsoft Azure Hybrid Benefit and Azure Site Recovery (ASR) integration deliver the industry’s fastest and most accurate cloud assessments for Azure customers. This announcement closely follows other recently announced Turbonomic capabilities for self-managing container platforms across customers’ Kubernetes-as-a-Service offering of choice. Additionally, recognizing Turbonomic’s unique […]

Data Backup

Interlock Technology now part of Dell EMC Select Program; offers Dell EMC Centera users option to migrate to ECS

Interlock Technology has added exclusive application-side migration support for the Enterprise Vault (EV) Streamer API, enabling seamless migration of Enterprise Vault (EV) data from existing Dell EMC Centera systems to Dell EMC’s ECS object storage system. By supporting the Streamer API from the EV application at the storage layer, Interlock Technology is able to provide high-speed migration to ECS S3 object storage systems without any modification by Dell EMC. Interlock […]

Data Storage

Cloudian joins iRODS Consortium; as its HyperStore Enterprise Object Storage certified with iRODS platform

Cloudian announced Tuesday that it has joined the iRODS Consortium, the foundation that leads development and support of the integrated Rule-Oriented Data System (iRODS). Testing for HyperStore enterprise object storage with iRODS is complete, and users may now deploy the combined solution where local workflows require cost-effective, exabyte-scalable storage and ease of integration. iRODS is free open source software for data discovery, workflow automation, secure collaboration and data virtualization used […]

Data Protection

US Signal aligns with Cloudflare to provide DDoS protection as part of expanded managed IT services line

US Signal, an end-to-end IT solutions provider, announced that it has partnered with Cloudflare to bring a fully managed and customizable distributed denial-of-service (DDoS) protection service to market. This service delivers DDoS mitigation for network, transport and application layers, and is fully backed by SLA. It is powered by Cloudflare’s global Anycast network and implemented by US Signal’s information security and provisioning team, with support and customization from its technical […]

WWPI – Covering the best in IT since 1980