Promisingly, security features and protections in the major public cloud platforms (AWS, Azure and GCP) have come a long way. Managing Cloud Infrastructure to Prevent Security Gaps
Perhaps the most obvious advantage of VM-based solutions is that multiple VM tenants can execute code on the same physical hardware. Challenges of Using Virtual Machines As Cloud Storage
The WADJET system is a real advance over other systems – it allows you to easily identify problems in a large, complex network without having to click through a long set of pop-ups from a dashboard, or parse a long list of events. A Deep-Dive Review of the WADJET System
Every day, more than four million data records are lost or stolen and this year alone, we have seen it surpass the one billion mark. Secure the Breach
Check out the steps data center operators can take to bridge IT and facility needs to optimize the physical infrastructure for SDDCs. Is Your Data Center Ready for SDDC?
Today’s virtualization specialists who want to be successful must pursue every opportunity to better understand all parts of the infrastructure stack and how they are impacted by the growing hybrid IT strategy. Becoming the Virtualization Admin of Tomorrow
A surprising 50 percent of IT managers typically chose to upgrade under-performing and aging computers. Simple Tips When Deciding Whether to Upgrade or Replace Your Computers

CEO CORNER

I am pleased to have an opportunity to share my thoughts on the importance of securing the digital identification and data of individuals, the enterpise, medical servivces, and finicial transactions in our rapidly growing mobile world....

Read More
IT Security

Imperva FlexProtect joins SecureSphere to ease security for hybrid cloud application deployments

Imperva Inc. announced on Wednesday Imperva FlexProtect to give customers access to both Imperva SecureSphere and Imperva Incapsula within a single subscription agreement. By providing the flexibility to deploy Imperva web application firewall (WAF) solutions based on need, the subscription helps organizations simplify the protection of enterprise applications as they migrate their portfolios from on-premises data centers to the cloud. To help monitor hybrid deployments, Imperva also announced a new […]

Cloud

Kubernetes now available on IBM Bluemix Container Service for built-in security and isolation

IBM released this week beta version of its Kubernetes support in the IBM Bluemix Container Service. The IBM Bluemix Container Service, now combines Docker and Kubernetes to deliver tools, an intuitive user experience, and built-in security and isolation to enable rapid delivery of applications, while leveraging cloud services including cognitive capabilities from Watson. IBM partnered with Docker in December 2014 to bring containers to the enterprise market and launched containers-as-a […]

Hot Companies

Cool Products

Virtualization

Red Hat Gluster Storage 3.2 boosts attractiveness for developers, administrators managing workloads

Red Hat announced this week general availability of Red Hat Gluster Storage 3.2. This latest version of Red Hat’s software-defined storage solution includes a number of enhancements and new features that seek to improve small file performance, provide data integrity at a lower cost, and enhance integration with Red Hat OpenShift Container Platform. Red Hat Gluster Storage 3.2 adds deeper integration with Red Hat OpenShift Container Platform, adding native support […]

Data Backup

QTS boosts cloud-based DRaaS capabilities with Zerto Virtual Replication Version 5.0

QTS Realty Trust enhanced on Tuesday its cloud-based Disaster Recovery as a Service (DRaaS) capabilities and solutions for midsize enterprises and government organizations. DRaaS is a rapidly growing market opportunity and an IT service typically delivered as part of a hybrid IT solution. Featuring Zerto Virtual Replication (ZVR) version 5.0 BC/DR software, QTS’ enhanced DRaaS protects mission critical workloads and applications to improve IT resiliency. QTS’ DRaaS is hypervisor agnostic […]

Data Storage

Chelsio adapters secure Lenovo, Dell certifications for Microsoft software-defined storage deployments

Chelsio Communications announced this week that its line of Terminator 5 & 6 (T5 & T6) 1/10/25/40/50/100 Gigabit Ethernet (GbE) iWARP (RDMA/TCP) enabled Unified Wire adapters have achieved hardware certifications for deploying Microsoft Windows Server based software-defined storage (SDS) with Lenovo and Dell server platforms. Chelsio iWARP enabled Unified Wire adapters power a range of Microsoft Windows software-defined storage capabilities including Storage Spaces Direct, Storage Spaces for high-performance file access, […]

Data Protection

Kaspersky Lab research discloses cost and profitability of arranging a DDoS attack

Kaspersky Lab experts have studied the DDoS services available on the black market and determined how far the illegal business has advanced, as well as the extent of its popularity and profitability. The research shows that arranging a DDoS attack can cost as little as $7 an hour, while the company targeted by the attack can end up losing thousands, if not millions of dollars in the process. DDoS attacks […]

WWPI – Covering the best in IT since 1980