Disruption of critical public services or data compromise can cost people their privacy, their livelihoods and sometimes even their lives. What IT security threats do enterprises have to deal with today? Large Organizations Not Yet Able to Secure their Complex IT Environments
With more than 75% of enterprise security breaches due to external threat actors, how can organizations apply intelligence and automation to augment digital defenses? The State of Digital Defense
Be aware that all public cloud providers are not alike. The Critical First Steps Towards Leveraging the Public Cloud to Meet Electronically Stored Information (ESI) Compliance Regulations
Fixing bottleneck issues is crucial and requires first identifying the underperforming component. Five Common Application Bottlenecks and Recommended Resolutions
Data virtualization is fast emerging as an architectural approach to quickly gain control over sensitive customer information stored across multiple systems. Protected by Design - How Data Virtualization Can Reduce Data Privacy Risk
Promisingly, security features and protections in the major public cloud platforms (AWS, Azure and GCP) have come a long way. Managing Cloud Infrastructure to Prevent Security Gaps
Perhaps the most obvious advantage of VM-based solutions is that multiple VM tenants can execute code on the same physical hardware. Challenges of Using Virtual Machines As Cloud Storage


I am pleased to have an opportunity to share my thoughts on the importance of securing the digital identification and data of individuals, the enterpise, medical servivces, and finicial transactions in our rapidly growing mobile world....

Read More
IT Security

OPAQ Networks joins with Duo Security to provide two-factor authentication as a security service

OPAQ Networks, a network security cloud company, announced on Monday a technology alliance with Duo Security to integrate Duo with the OPAQ security-as-a-service platform. OPAQ managed security services partners can now offer Duo’s Trusted Access platform to protect their customers’ systems and data from unauthorized access. Duo verifies the identity of the user and the security posture of the device before allowing access to any critical applications. The integration of […]


Adobe set to acquire Magento Commerce in bid to bring commerce platform to Adobe Experience Cloud

Adobe announced on Tuesday it has entered into a definitive agreement to acquire Magento Commerce, a commerce platform, for $1.68 billion, subject to customary purchase price adjustments. The addition of the Magento Commerce Cloud will enable commerce to be seamlessly integrated into the Adobe Experience Cloud, delivering a single platform that serves both B2B and B2C customers globally. The Magento Platform brings together digital commerce, order management and predictive intelligence […]

Hot Companies

Cool Products


Red Hat Hyperconverged Infrastructure for Cloud bridges data centers and edge deployments to deliver open platform for innovation at the edge

Red Hat introduced on Tuesday Red Hat Hyperconverged Infrastructure for Cloud, an integrated solution for customers seeking to co-locate compute and storage functions in OpenStack environments. The new offering combines Red Hat OpenStack Platform 13 and Red Hat Ceph Storage 3 in a single user experience, supported by a common lifecycle for greater operational and organizational efficiency. Red Hat Hyperconverged Infrastructure for Cloud provides a smooth customer experience from procurement […]

Data Backup

Syncsort improves security strategy with acquisition of Townsend Security’s IBM i data privacy products

Syncsort announced on Monday that it has signed a definitive agreement to acquire IBM i encryption, tokenization, authentication, FTP and SIEM integration products from Townsend Security, a Washington-state based provider of data privacy software. Additionally, the companies are announcing a partnership agreement for Syncsort to resell Townsend Security’s Alliance Key Manager product. Townsend Security’s Alliance Key Manager enterprise key management solution for IBM i, IBM z, Windows and Linux supports […]

Data Storage

New McObject eXtremeDB using E8 Storage sets multiple records in STAC benchmark tests

McObject, developer of eXtremeDB database system for real-time and historical data analysis, announced Tuesday that it has set multiple STAC-M3 benchmark records, running on E8 Storage, provider of shared accelerated storage for data-intensive, high-performance applications that drive business revenue. This combination produced high results in STAC Benchmarks, with the tests performing 17 times faster than the previous best results. The results firmly cement McObject’s place at the forefront of the […]

Data Protection

Utimaco announces intent to acquire Atalla from Micro Focus; to strengthen investment in HSM business

Utimaco announced on Friday intent to acquire the Atalla HSM and ESKM business lines from Micro Focus, which were previously owned by Hewlett Packard Enterprise (HPE) prior to the September 2017 merger of its Software business with Micro Focus. Germany-based Utimaco, active in the HSM market for over 35 years, is a global manufacturer of general purpose HSMs. Utimaco has built its market leading position focusing on indirect sales through […]

WWPI – Covering the best in IT since 1980