<
>

Posts in Data Protection

Frost says finance and government are most targeted by cyber criminals

The latest Frost & Sullivan report Analysis of the Global Web and Email Content Security Market reveal that security professionals rank 1) application vulnerabilities, 2) malware, followed by 3)...

Tape to outlast deduplication

Tape to outlast deduplication? Back in 2009 deduplication** looked like it may be the technology to finally replace tape. Today when we consider how backup technology is progressing we at...

Assessing the right solution for data protection and disaster recovery

It is a tough decision for any CIO to implement the right solution to ensure that the company’s data is always well-protected. In today’s 24x7 business environment, companies of all sizes...

The Role of Management in Business Continuity

Catalyst Organisations demand higher levels of system and network availability, and cost effective business continuity; however, all this must be managed and maintained by one department with one IT...

Survey says increasing device, data and remote usage is impacting network security

Security vendor Barracuda Networks is a leading provider of cloud-connected security and storage solutions, today shared that approximately 52 percent companies admitted that managing application...

Top 5 IAM trends for 2014

According to CA Technologies the software-defined, open enterprise is emerging forcing a remake of the enterprise as a platform for experimentation among developers. Every IT layer from data to...

Enterprise embrace Purpose-Built Backup Appliance as turnkey, simplified approach to data protection and recovery

IDC defines a purpose-built backup appliance (PBBA) as a standalone disk-based solution that utilizes software, disk arrays, server engine(s), or nodes that are used for a target for backup data and...

Imperva warns Database as a Service is new hacking vector

Security vendor Imperva says its new Hacker Intelligence Initiative report, “Assessing the Threat Landscape of DBaaS” pointed to a new malware platform for cybercriminals: Database as a...

China bests the world in Trusted IT infrastructure

A survey across 16 countries and 10 industry sectors reveals that a lack of senior executive confidence permeates organizations globally, specifically concerning readiness around the critical IT...

EMC offers predictable extreme performance with XtremIO All-Flash Array

EMC claims that its XtremIO™ is the first and only all-flash array to provide consistent and predictable extreme performance to any application workload over any period of time, regardless of...

Pages

Subscribe to RSS - Data Protection