NEWS

CTERA adds Data Exfiltration Prevention

CTERA launches honeypot decoy capabilities to address data extortion and insider threats.

Read More

NEWS

Commvault acquires Appranix

Acquisition enables Commvault to solve a critical cyber resilience challenge facing enterprises today – rapidly rebuilding cloud applications after an outage or attack.

Read More

NEWS

Hitachi Vantara introduces Virtual Storage Platform One

Unbreakable hybrid cloud platform seamlessly integrates structured and unstructured data, redefining data management efficiency and flexibility for enterprises.

Read More

NEWS

Scality signs go-to-market distribution agreement with Ingram Micro

New alliance advances enterprise cyber resiliency with Scality ARTESCA immutable object storage software.

Read More

NEWS

Spectra Logic introduces LumOS Library Management Software

Next-generation LumOS software to power new TFinity Plus and Spectra Cube libraries.

Read More

NEWS

Wasabi Technologies introduces Wasabi AiR

The industry’s first searchable active archive leverages AI recognition to bring structure to unstructured data, enabling businesses to put their content to work.

Read More

New supercomputer’s monumental performance marks a new era in artificial intelligence, scientific...
The facility focuses on optimising hard disk drive configurations in cloud storage, surveillance,...
BMC AMI places machine learning, predictive analytics, domain expertise, and intelligent automation...
Kubernetes has firmly transitioned from an emerging technology into a core part of enterprise...
AMD unleashes the power of specialized compute for the data center with new AMD EPYC processors for...
Cohesityhas expanded its security offerings with the release of Cohesity CyberScan, a new...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more