Mobile security in the spotlight

63% of businesses do not attempt to manage corporate information on employee-owned devices; mobile security incidents cost more than $100,000 for almost half of firms surveyed.

Read More


Most data breaches caused by human and system errors

Symantec Corp. and the Ponemon Institute have released the 2013 Cost of Data Breach Study: Global Analysis which reveals human errors and system problems caused two-thirds of data breaches in 2012 and pushed the global average to $136 per record[1]. Issues included employee mishandling of confidential data, lack of system controls, and violations of industry and government regulations. Heavily regulated fields including healthcare, finance and pharmaceutical incurred breach costs 70 percent...

Read More

DDoS for the data centre

Juniper Networks has announced the availability of Junos® DDoS Secure to protect data centres against increasingly complex Distributed Denial of Service (DDoS) attacks. A key part of Juniper’s security portfolio, Junos DDoS Secure uses behavioral analytics and detailed network visibility to provide scalable protection against all major types of DDoS attacks.

Read More

Converged infrastructure choices from Dell

New solutions optimised for applications and workloads from branch office to scale-out data centre.

Read More


Long-standing alliance expands Azure NetApp Files, NetApp BlueXP and Cloud Volumes ONTAP portfolio...
The University of Birmingham has been awarded £4m for a major project to develop a computing...
Cohesityhas expanded its security offerings with the release of Cohesity CyberScan, a new...
Hitachi Vantara has introduced an expanded set of offerings to help manufacturers accelerate...
Server OEMs and cloud operators designing storage platforms for next-generation data centers need...
During VMworld, Zerto has launched an Early Access Program for the Zerto platform certified with...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more