Rechtliche Implikationen beim Einsatz von IT-Monitoring-Systemen in Unternehmen

RSA, die Sicherheitssparte von EMC, hat in Zusammenarbeit mit der Wirtschaftsprüfungs- und Beratungsgesellschaft KPMG und der KPMG Rechtsanwaltsgesellschaft ein Whitepaper zu „RSA Security Analytics“ vorgelegt. Es enthält allgemeine Hinweise an Unternehmen, wie sie in...

Read More
Acronis: Hoch zuverlässige und skalierbare Storage-Archivierungs-Lösung mit wegweisender Wirtschaftlichkeit - Erste Lösung für zuverlässigen, skalierbaren und effizienten Storage unter Nutzung kostengünstiger Hardwar

Acronis® hat heute die Einführung von Acronis Storage angekündigt, einer Software-basierten Storage-Lösung für die Aufbewahrung großer Datenmengen in der Cloud.  Zahlreiche Anwender mit jeweils Petabytes an Daten können sich in diesem voll-automatischen,...

Read More
GFI adds Web Protection to its GFI Cloud

Aimed at the SMB community, Web Protection should help protect against users accessing unapproved Websites and services, reducing the risk to the business

Read More
Big Data used to make business decisions, but not owned by decision makers

Survey results show acceptance of Big Data in making important business decisions, but too often being owned by IT department.

Read More
Portfolio Management in the cloud

Software AG launches Portfolios Live, a cloud-delivered tool for managing – and moving...

Read More
The Big Data opportunity sliced and diced – vertically

Sean Farrington, MD, UK & Ireland and Regional Vice President for Northern Europe at QlikTech,...

Read More
The world’s fastest data centre firewall appliance?

Fortinet® has announced a new high performance, compact network firewall appliance for...

Read More
Rostelecom selects Infinera

Infinera and Rostelecom, OJSC. have initiated the deployment of the Infinera DTN-X platform based...

Read More
Unisys unveils Stealth solution

New Unisys Stealth for Mobile solution protects against data breaches and other cybersecurity risks...

Read More
Public Cloud offering for IT portfolio management

Portfolios Live offers CIOs precise and transparent management of their IT landscapes and is part...

Read More
Ensuring application performance and security resiliency

New PerfectStormTM platform validates applications, security, storage, networking, voice and video...

Read More
Neustar to host International DDoS Awareness Day

Speakers from law enforcement, government and security industry join forces to educate and raise...

Read More

Videos

Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, shares his thoughts on the future direction of BCDR and advice for MSPs to develop an optimised, comprehensive BCDR offering for SMBs.
Dr. J Metz, SNIA Chair, explains how AI workloads are extraordinarily complex and constrained by issues related to latency, space, power and cooling, memory, and cost and how addressing these problems through...
Ian Schenkel, Chief Revenue Officer, Cyber Intelligence House (CIH), explains how the company’s intelligence-driven Cyber Exposure Platform is designed for MSSPs to deliver high margin, high value services...

Expert Opinions

By Dave King, Product Engineering Architect at Cadence.
By Darin Patterson, VP of Market Strategy at Make.
By Kate Steele, Director, EMEA HPC/AI at Lenovo Infrastructure Solutions Group.
BY Jerry Fujii and Naoki Ueyama, Partners in the Tokyo office of Morgan Lewis.