NEWS

CTERA adds Data Exfiltration Prevention

CTERA launches honeypot decoy capabilities to address data extortion and insider threats.

Read More

NEWS

Commvault acquires Appranix

Acquisition enables Commvault to solve a critical cyber resilience challenge facing enterprises today – rapidly rebuilding cloud applications after an outage or attack.

Read More

NEWS

Hitachi Vantara introduces Virtual Storage Platform One

Unbreakable hybrid cloud platform seamlessly integrates structured and unstructured data, redefining data management efficiency and flexibility for enterprises.

Read More

NEWS

Scality signs go-to-market distribution agreement with Ingram Micro

New alliance advances enterprise cyber resiliency with Scality ARTESCA immutable object storage software.

Read More

NEWS

Spectra Logic introduces LumOS Library Management Software

Next-generation LumOS software to power new TFinity Plus and Spectra Cube libraries.

Read More

NEWS

Wasabi Technologies introduces Wasabi AiR

The industry’s first searchable active archive leverages AI recognition to bring structure to unstructured data, enabling businesses to put their content to work.

Read More

Asset management technologies and tools are available to initiate zombie hunts and eliminate...
HIAG Data, an infrastructure-as-a-service (IAAS) provider in Switzerland, has deployed a two...
Exos X20 and IronWolf Pro 20TB CMR-based HDDs help organizations maximize the value of data.
Workers today use an average of 6.3 “file silos” – email apps, network drives, cloud...
Hibernian FC is delighted to announce an innovative multi-year partnership with Acronis, the global...
UK cloud service provider cites data recovery speeds, cost-savings and scalability as crucial...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more