Outsourcery announces new Survivable Branch Appliance Integration service for enterprise telephony resilience

Proposition set to improve enterprise resilience in the face of a WAN outage and ensure critical business processes are maintained.

Read More


Infoblox expands security offerings

Infoblox Inc. has introduced new solutions to help global businesses, government agencies and service providers secure their networks against cyber threats.

Read More

Centrify delivers secure access controls for Red Hat storage

Centrify Corporation says that Centrify DirectControl has added enhanced support for Red Hat Storage, delivering Active Directory-based authentication and single sign-on for users accessing file shares on Red Hat Storage. Enterprises can now benefit from additional secure access to data stored on Red Hat Storage using native Windows protocols and leveraging Active Directory. The solution will be unveiled this week at Red Hat Summit 2013 at Centrify’s Booth No. 1012.

Read More

Award-Triple für Computacenter - IT-Dienstleister zum wiederholten Male von Cisco ausgezeichnet

m Rahmen seines diesjährigen Partner Summits in Boston ehrte Cisco Computacenter gleich mit drei Auszeichnungen: Der IT-Dienstleister erhielt die Awards „Enterprise Partner of the Year – Central Europe“, „Enterprise Partner of the Year – Germany“ und „Services Partner of the Year – Germany“

Read More

Serverless tool provides malware scanning for compliance and security of files in cloud-based...
Features Qualstar Q24 compact SAS tape libraries and ATTO XstreamCORE ® ET 8200 intelligent...
SSD usage up, but recovery incidents are also on the rise.
BMC AMI and Compuware solutions help enterprises accelerate innovation with expanded AI, new...
Veeam Software and Lenovo have introduced Lenovo TruScale Backup with Veeam, a cloud-like...
Researchers from across the University of Exeter are benefitting from a new High Performance...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more