Disruption of critical public services or data compromise can cost people their privacy, their livelihoods and sometimes even their lives. What IT security threats do enterprises have to deal with today? Large Organizations Not Yet Able to Secure their Complex IT Environments
With more than 75% of enterprise security breaches due to external threat actors, how can organizations apply intelligence and automation to augment digital defenses? The State of Digital Defense
Be aware that all public cloud providers are not alike. The Critical First Steps Towards Leveraging the Public Cloud to Meet Electronically Stored Information (ESI) Compliance Regulations
Fixing bottleneck issues is crucial and requires first identifying the underperforming component. Five Common Application Bottlenecks and Recommended Resolutions
Data virtualization is fast emerging as an architectural approach to quickly gain control over sensitive customer information stored across multiple systems. Protected by Design - How Data Virtualization Can Reduce Data Privacy Risk
Promisingly, security features and protections in the major public cloud platforms (AWS, Azure and GCP) have come a long way. Managing Cloud Infrastructure to Prevent Security Gaps
Perhaps the most obvious advantage of VM-based solutions is that multiple VM tenants can execute code on the same physical hardware. Challenges of Using Virtual Machines As Cloud Storage

CEO CORNER

I am pleased to have an opportunity to share my thoughts on the importance of securing the digital identification and data of individuals, the enterpise, medical servivces, and finicial transactions in our rapidly growing mobile world....

Read More
IT Security

InSpec by Chef 3.0 boosts compliance automation for DevSecOps with new plugin architecture, management, workflow APIs

Chef released on Tuesday updates to its InSpec by Chef compliance automation platform, including a new plugin architecture, greatly improved ease-of use, improved exception management and automated compliance for Terraform. InSpec 3.0 increases the velocity of compliance audits and remediation, while reducing risk for cross-functional security, development and operations (DevSecOps) teams and their organizations. InSpec is an open-source language for describing security and compliance rules that can be shared between […]

Cloud

HPE releases five hybrid cloud solutions, jointly developed with Microsoft, to enable SMBs to offer secure cloud offerings

Hewlett Packard Enterprise (HPE) announced this week that it is simplifying small to midsized businesses’ (SMBs) ability to deploy enterprise capabilities like wireless access points and cloud services to improve productivity and increase bottom line. HPE is unveiling these offerings this week at the annual SpiceWorld conference in Austin, Texas. These offerings are simple, secure and affordable, featuring technologies from Microsoft and Aruba, a Hewlett Packard Enterprise company, and combine […]

Hot Companies

Cool Products

Virtualization

Cloudify, Lumina Networks partner to automate networks, enabling agile service deployment

Cloudify Platform and Lumina Networks have announced a strategic partnership to bring agility to service providers with legacy and virtualized networks. The two companies will cooperate on customer deployments to automate service delivery without vendor lock-in. On the heels of a tier-one service provider production deployment, the two companies will productize a new open source plug-in to enable service orchestration for brownfield networks that want to deploy NFV. Lumina Networks […]

Data Backup

Red Box integrates with Cloud9 to deliver a comprehensive compliance offering for voice trading

Red Box has extended the breadth of its voice capture capability through an integration with Cloud9’s cloud based trader voice communications platform, C9 Trader. Cloud9 has recently been named to the Fintech 250 acknowledging the firm’s technology within the voice trading industry. The Red Box offering with Cloud9’s C9 Trader desktop – available now as part of its 4C release — also incorporates seamless integration with compliance archiving and analytics […]

Data Storage

Caringo releases Swarm 10 platform, single server object storage; delivers S3 throughput with sustained PB-scale NFS read/write

Caringo announced on Wednesday the Swarm 10 Platform that touches every part of the Caringo Product suite, and leverages Swarm’s unique pure-object approach to deliver enhanced performance at petabyte scale. Caringo also launched a new single server appliance targeted at media and entertainment (M&E) organizations, particularly targeting post-production houses, studios, broadcasters and small enterprises. Unlike most object-based storage solutions—which require an initial Linux install on disk, relying on expensive caching […]

Data Protection

Tripwire Enterprise fully integrates into Lastline’s advanced malware threat detection

Tripwire announced on Tuesday that it has entered into a partnership agreement with Lastline, vendor of AI-powered network security to incorporate Lastline’s advanced malware detection technology into Tripwire’s Malware Detection Service. Tripwire’s resulting solution combines Lastline malware analysis with Tripwire Enterprise’s change detection capabilities to identify malware as soon as it is introduced to a system. By combining Lastline’s AI-powered malware detection with Tripwire’s file integrity monitoring (FIM), security teams […]

WWPI – Covering the best in IT since 1980