<
>

Posts in Data Protection

Top 5 IAM trends for 2014

According to CA Technologies the software-defined, open enterprise is emerging forcing a remake of the enterprise as a platform for experimentation among developers. Every IT layer from data to...

Enterprise embrace Purpose-Built Backup Appliance as turnkey, simplified approach to data protection and recovery

IDC defines a purpose-built backup appliance (PBBA) as a standalone disk-based solution that utilizes software, disk arrays, server engine(s), or nodes that are used for a target for backup data and...

Imperva warns Database as a Service is new hacking vector

Security vendor Imperva says its new Hacker Intelligence Initiative report, “Assessing the Threat Landscape of DBaaS” pointed to a new malware platform for cybercriminals: Database as a...

China bests the world in Trusted IT infrastructure

A survey across 16 countries and 10 industry sectors reveals that a lack of senior executive confidence permeates organizations globally, specifically concerning readiness around the critical IT...

EMC offers predictable extreme performance with XtremIO All-Flash Array

EMC claims that its XtremIO™ is the first and only all-flash array to provide consistent and predictable extreme performance to any application workload over any period of time, regardless of...

BYOD takes second place over apps among Chinese enterprise

A regional surprise of enterprise mobility usage in Asia Pacific and Japan (APJ) shows Bring Your Own Device (BYOD) taking a backseat to mobile apps as the area of highest priority. According to the...

Dell SecureWorks Launches Server Protection Services for Physical, Virtual and Cloud-Based IT Servers

Dell SecureWorks, an industry leader in information security services, now provides Server Protection Services for physical, virtual and cloud-based servers so organizations can secure...

SLAs of Data Protection and Backup – a Jive Software perspective

Aman Singh, Senior Enterprise Storage and Backup Architect of Jive Software, talks about the SLAs they promise customers in data protection live inside theCUBE with Wikibon's Dave Vellante and...

CA Technologies and NTT Com Security partner to offer IAM-as-a-Service to address data sovereignty

CA Technologies signed an agreement with NTT Com Security (formerly known as Integralis) to host CA CloudMinder Identity and Access Management (IAM) software-as-a-service solution in the Asia Pacific...

RSA upgrades offerings marries SIEM with advanced security capabilities

Security specialist RSA launches products and service combo to help organizations mature their security operations and accelerate incident response functions while addressing traditional SIEM...

Pages

Subscribe to RSS - Data Protection