Disruption of critical public services or data compromise can cost people their privacy, their livelihoods and sometimes even their lives. What IT security threats do enterprises have to deal with today? Large Organizations Not Yet Able to Secure their Complex IT Environments
With more than 75% of enterprise security breaches due to external threat actors, how can organizations apply intelligence and automation to augment digital defenses? The State of Digital Defense
Be aware that all public cloud providers are not alike. The Critical First Steps Towards Leveraging the Public Cloud to Meet Electronically Stored Information (ESI) Compliance Regulations
Fixing bottleneck issues is crucial and requires first identifying the underperforming component. Five Common Application Bottlenecks and Recommended Resolutions
Data virtualization is fast emerging as an architectural approach to quickly gain control over sensitive customer information stored across multiple systems. Protected by Design - How Data Virtualization Can Reduce Data Privacy Risk
Promisingly, security features and protections in the major public cloud platforms (AWS, Azure and GCP) have come a long way. Managing Cloud Infrastructure to Prevent Security Gaps
Perhaps the most obvious advantage of VM-based solutions is that multiple VM tenants can execute code on the same physical hardware. Challenges of Using Virtual Machines As Cloud Storage


I am pleased to have an opportunity to share my thoughts on the importance of securing the digital identification and data of individuals, the enterpise, medical servivces, and finicial transactions in our rapidly growing mobile world....

Read More
IT Security

SecurityFirst’s DataKeep offering delivers resilient ransomware recovery to minimise downtime with the fastest path to recovery

SecurityFirst, provider of data-centric cyber security, announced on Wednesday the availability of its resilient ransomware recovery solution. DataKeep, which delivers encrypted copy/backup, workload isolation and geographic data distribution in object storage for added resiliency. The features in DataKeep that assist in resilient ransomware recovery include DataKeep Agents with native backup/restore capabilities. Its backup and archival processes are an important aspect of data loss prevention and recovery from unexpected hardware and […]


Samsung debuts 8TB SSD for data centers to offer high storage density of 576TB in 2U servers

Samsung Electronics launched on Wednesday its high capacity NVMe solid state drive (SSD) based on next-generation Small Form Factor (NGSFF) – an eight-terabyte (TB) NF1 SSD. The 8TB NVMe NF1 SSD has been optimized for data-intensive analytics and virtualization applications in next-generation data centers and enterprise server systems. The SSD is built with 16 of Samsung’s 512-gigabyte (GB) NAND packages, each stacked in 16 layers of 256 gigabit (Gb) 3-bit […]

Hot Companies

Cool Products


Red Hat Process Automation Manager 7 offers cloud-native process automation, case management capabilities for business and IT users

Red Hat announced on Tuesday launch of Red Hat Process Automation Manager 7, a comprehensive, cloud-native platform for developing business automation services and process-centric applications across hybrid cloud environments. Process Automation Manager is the next generation of Red Hat’s business process management (BPM) offering, Red Hat JBoss BPM Suite, and enables organizations to streamline, automate, measure and continuously improve business operations. Process Automation Manager provides both business and IT users […]

Data Backup

Demisto combines with Preempt for initial end-to-end, real-time threat prevention and incident response offering

Preempt, a company revolutionizing prevention of cyber security breaches and internal threats, in partnership with Demisto, a vendor of security orchestration, automation and response (SOAR) technology, announced on Thursday a fully adaptive approach to cybersecurity and security operations that spans advanced threat prevention, incident response, and security orchestration. Through this integration, Demisto and Preempt are delivering its initial end-to-end integration of real-time, identity-based threat prevention with security automation and orchestration. […]

Data Storage

New Toshiba Memory RM5 vSAS line offers enhanced performance, reliability and capacity at a price point that allows SATA replacement in servers

Toshiba Memory Corp. unveiled on Tuesday a new, game-changing category of SAS SSDs expected to replace SATA SSDs in server applications. The RM5 12Gbit/s value SAS (vSAS) series features capacity, performance, reliability, manageability and data security advantages – at a price that obsoletes SATA SSDs. Designed with affordability and server applications in mind, Toshiba Memory Corporation’s RM5 vSAS series seeks to provide a cost effective and much higher performing solution […]

Data Protection

Broadcom extends server storage market by collaborating with Hewlett Packard Enterprise to deliver mix of product, technical expertise, support

Broadcom Inc. announced on Wednesday that it is extending its collaboration with Hewlett Packard Enterprise (HPE) in server storage offerings and will showcase them this week at HPE Discover. Broadcom will highlight benefits of the SFF-TA-1001 specification commonly known as the U.3 reference platform with a U.3 universal drive cage demonstration featuring Toshiba U.3-enabled NVMe, SAS, and SATA drives. This development further expands Broadcom’s collaboration with HPE, which now includes […]

WWPI – Covering the best in IT since 1980