Mobile security in the spotlight

63% of businesses do not attempt to manage corporate information on employee-owned devices; mobile security incidents cost more than $100,000 for almost half of firms surveyed.

Read More


Most data breaches caused by human and system errors

Symantec Corp. and the Ponemon Institute have released the 2013 Cost of Data Breach Study: Global Analysis which reveals human errors and system problems caused two-thirds of data breaches in 2012 and pushed the global average to $136 per record[1]. Issues included employee mishandling of confidential data, lack of system controls, and violations of industry and government regulations. Heavily regulated fields including healthcare, finance and pharmaceutical incurred breach costs 70 percent...

Read More

DDoS for the data centre

Juniper Networks has announced the availability of Junos® DDoS Secure to protect data centres against increasingly complex Distributed Denial of Service (DDoS) attacks. A key part of Juniper’s security portfolio, Junos DDoS Secure uses behavioral analytics and detailed network visibility to provide scalable protection against all major types of DDoS attacks.

Read More

Converged infrastructure choices from Dell

New solutions optimised for applications and workloads from branch office to scale-out data centre.

Read More


High-Performance Computing Center Stuttgart (HLRS) has selected DDN's EXAScaler® with IME®...
HCL Technologies has issued findings on digital technology investment and deployment by enterprises...
Assured Data Protection has launched its eXtended Detection and Response (XDR) service, providing...
Following the announcement of its AI strategy and full-stack, all-scenario AI solutions in 2018,...
New StorONE v3.9 challenges the flash-first narrative, offering superior performance and cost...
NVIDIA has completed its acquisition of Mellanox Technologies, Ltd., for a transaction value of $7...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more