Regular auditing helps contribute towards a more secure IT environment. Ten Ways Auditing Helps to Improve Security
Entrepreneurs must strike a balance between innovation and cyber risk management. Why Entrepreneurs Should Take Cyber Risk Seriously
By implementing virtual desktop infrastructure (VDI) solutions, IT can simplify deployment, reduce the strain in client support and provide access to analytics and intelligence about usage. Migrating to Windows 10: Just Drag and Drop with Virtual Desktop Infrastructure
More than 50 percent of companies are now incorporating nonvolatile memory, which is one of the reasons data storage is fast becoming the new IT celebrity. Data Storage – Five Reasons Why It’s the New Celebrity
We need to stop prolonging the inevitable and take steps toward migrating towards Windows 10. Don’t Prolong the Inevitable: Considerations for Migrating to Windows 10
What the world needs to improve in network security is to reverse the natural sequence of TCP/IP. Software Defined Perimeter: The Secret Service of TCP/IP Networks
If you’re keen on strengthening your Microsoft partnership and learning more about growing your business, then WPC is an event you’ll need to attend. Five Things Partners Can Expect to Learn at Microsoft WPC 2016


I am pleased to have an opportunity to share my thoughts on the importance of securing the digital identification and data of individuals, the enterpise, medical servivces, and finicial transactions in our rapidly growing mobile world....

Read More
IT Security

Unisys adds LogRhythm security intelligence technology to its managed security services offering

Unisys Corp. expanded on Monday its suite of managed security service offerings to include technology from security analytics vendor LogRhythm. Unisys integrated LogRhythm’s next generation security intelligence services into the core of its global network of security operations centers to increase protections and efficiencies for clients from growing risks associated with cyber threats. Unisys also will integrate LogRhythm technology with Unisys Stealth, a suite of software-defined security products that lower […]


Red Hat Satellite 6.2 improves efficiency across on-premise, cloud, container-based environments

Red Hat announced Thursday general availability of Red Hat Satellite 6.2, its systems lifecycle management tool across physical, virtual, and private and public cloud environments. Red Hat Satellite 6.2 introduces remote execution and extends capabilities for container management and security. Available to all Red Hat Satellite customers with a valid subscription, Red Hat Satellite 6.2 offers container host provisioning, supporting and managing Red Hat’s lightweight container operating system, Red Hat […]

Hot Companies

Cool Products


Oracle set to acquire cloud company NetSuite for US$9.3 billion in cash

Oracle announced on Thursday that it has entered into a definitive agreement to acquire cloud company NetSuite for a transaction value of US$109.00 per share in cash, or approximately $9.3 billion. The addition of NetSuite will enable Oracle to expand its ability to support customers of any size in more industries and more countries. The proposed transaction is expected to close later this year. Until the transaction closes, Oracle and […]

Data Backup

AWS adds support for SQL Server native backup/restore to Amazon Relational Database Service

Amazon Web Services (AWS) announced Wednesday that it has added support for SQL Server native backup/restore to Amazon Relational Database Service (RDS). SQL Server native backups include all database objects: tables, indexes, stored procedures and triggers. These backups are commonly used to migrate databases between different SQL Server instances running on-premises or in the cloud, which can be used for various capabilities including data ingestion and disaster recovery. The native […]

Data Storage

HP Enterprise offers privileged account management service with CyberArk to derail cyber attacks

Hewlett Packard Enterprise (HPE) announced Monday the HPE Privileged Account Management (PAM) Service offering, an extension to its HPE Managed Security Services (MSS) portfolio. In partnership with privileged account security software vendor CyberArk, this offering is designed to help customers more effectively mitigate the heightened risk associated with privileged accounts, enforce more consistent application of security policies, and reduce manual efforts and administrative costs. HPE PAM Service leverages the ten […]

Data Protection

Toshiba begins shipping samples of its 64-layer 3D flash memory

Toshiba Corp. released latest generation of its BiCS FLASH three-dimensional (3D) flash memory with a stacked cell structure, a 64-layer device that will be begin sample shipments Tuesday. The device incorporates 3-bit-per-cell (triple-level cell, TLC) technology and achieves a 256-gigabit (32-gigabytes) capacity, an advance that underscores the potential of Toshiba’s proprietary architecture. Toshiba continues to refine BiCS FLASH, and the next milestone on the development roadmap is a 512-gigabit (64-gigabytes) […]

WWPI – Covering the best in IT since 1980