What companies must know about Bring Your Own Device to work

By Don Jackson, CISSP, a Senior Security Researcher with the Counter Threat Unit (CTUTM) Research Team at Dell SecureWorks

Read More


Big Data Hoarding – the elephant in the room

Hoarding every bit of data is a serious affliction for 75% of organisations and a predicted 4,300% growth in data by 2020 is going to create substantial pressures on many IT organisations says Neil Hewer,Technical Director, Data Continuity Group.

Read More

New Red Hat Storage Server capabilities deliver the foundation for Enterprise Open Hybrid Clouds

Red Hat is pleased to announce the availability of new Red Hat Storage Server 2.0 features and capabilities that bring enhanced virtual machine storage functionality for Red Hat Enterprise Virtualization, end-to-end encryption for data at rest and in motion, and enhanced security and data availability.

Read More

First dedicated online Lloyd George patient records service in primary care

Grove House Practice, the first GP surgery in the UK to computerise its entire Lloyd George patient records library using new NHS online managed service.

Read More

Chyro Media Asset Management selects Scality

Scality and Chyro, the leading provider of next generation digital asset management solutions, have announced the integration of Chyro Web Media Manager with Scality RING for Digital Media.

Read More

New program helps partners thrive in the cloud era, guide customers through data transformation.
Commvault® Recovery Range™, powered by SimSpace, is the first to integrate realistic attack...
Datrium DRaaS is first to offer enterprise-class on-demand disaster recovery (DR) from S3 backups,...
NUVIA, a silicon design company, has announced the close of its Series B funding round, raising...
Accelerating AI research and development, demonstration, and implementation in society through...
Collaboration with Equinix brings additional access, compute, and data center colocation. 
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more