NEWS

CTERA adds Data Exfiltration Prevention

CTERA launches honeypot decoy capabilities to address data extortion and insider threats.

Read More

NEWS

Commvault acquires Appranix

Acquisition enables Commvault to solve a critical cyber resilience challenge facing enterprises today – rapidly rebuilding cloud applications after an outage or attack.

Read More

NEWS

Hitachi Vantara introduces Virtual Storage Platform One

Unbreakable hybrid cloud platform seamlessly integrates structured and unstructured data, redefining data management efficiency and flexibility for enterprises.

Read More

NEWS

Scality signs go-to-market distribution agreement with Ingram Micro

New alliance advances enterprise cyber resiliency with Scality ARTESCA immutable object storage software.

Read More

NEWS

Spectra Logic introduces LumOS Library Management Software

Next-generation LumOS software to power new TFinity Plus and Spectra Cube libraries.

Read More

NEWS

Wasabi Technologies introduces Wasabi AiR

The industry’s first searchable active archive leverages AI recognition to bring structure to unstructured data, enabling businesses to put their content to work.

Read More

Talent and training partner, mthree, which supports major global tech, banking, and business...
Zerto to provide disaster recovery, continuous data protection, and mobility in a single, simple,...
At the Mobile World Congress (MWC) 2019, Huawei released its next-generation data center-level...
Features Qualstar Q24 compact SAS tape libraries and ATTO XstreamCORE ® ET 8200 intelligent...
Nebulon, Inc.® the pioneer of smartInfrastructure, server-embedded infrastructure software...
Move from a complex multivendor legacy solution, fast recovery from outages and a future proof...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more