Information Technology Editor's Pick


Subscribe to the InfoTech eNewsletter

Editor's Pick

Cybersecurity Market Report
May 29, 2015 - 2:29 PM
The worldwide cybersecurity market is defined by market sizing estimates that range from $71 billion in 2014 to $155+ billion by 2019.

ObserveIT Fills Void in AWS Security with CloudThreat Solution
May 28, 2015 - 5:19 PM
ObserveIT announced recently that it had launched its CloudThreat security solution for Amazon Web Services. The new solution fills a void where many cloud environments had previously been left unprotected.

Architecture Study Shows Ongoing Need for Cloud Solutions
May 28, 2015 - 9:06 AM
In an increasingly cloud-based solutions world, are vertical markets best/better served by horizontal cloud-based solutions that can be customized, or by unique cloud-based capabilities designed to meet extensive and very specialized needs?

Commvault Provides Security and Compliance in the File Sync and Share Solution Market
May 27, 2015 - 6:19 PM
The Internet and affordable computing devices have increased the amount of data we create exponentially. While this has presented many opportunities for analyzing the information to gain valuable insight, it has also introduced considerable challenges on how to store, protect and make the data available with greater efficiency.

Best Practices for Maintaining an Effective ERP Implementation
May 26, 2015 - 6:20 PM
Long ago, the ERP landscape was very scant, serving only the largest of companies. Innovations we have experienced in the last few years has vastly altered this landscape, allowing enterprise resource planning to be a part of virtually any company of any size. This has led businesses to make better decisions with regard to their human resources, business practices, and allocation of capital for various projects and activities. It's very difficult to overestimate the effect and savings this resource has had on operators in every industry.

The Gap Between Enterprise Security and Employee Actions
May 26, 2015 - 5:04 PM
According to recent research from SOTI, there is a serious gap between the precautions businesses take to protect their data and the actions their employees take with company data.

BMC Releases Remedy 9 Service Management Solution with Modernized Design
May 22, 2015 - 2:18 PM
BMC recently announced the release of the latest version of its service management platform, Remedy 9. A rich set of analytics combined with an appealing user interface are a couple of the many new features of the updated solution.

IBM Recognized as a Leader in the Digital Transformation Implementation Market
May 22, 2015 - 1:39 PM
International Data Corporation (IDC), a provider of market intelligence, advisory services and events for the IT, telecom and consumer technology markets, has published a new MarketScape report that takes an in-depth look at the operations of vendors in the digital transformation implementation market. Known as the "IDC MarketScape: Worldwide Digital Transformation Consulting and System Integration Services 2015 Vendor Assessment," the report studies both quantitative and qualitative characteristics that explain success by covering a variety of vendors with a comprehensive evaluation process.

Managing Risk May Get Easier with New IBM and Deloitte Project
May 20, 2015 - 2:22 PM
Risk: it's not just a board game anymore. For businesses, it can represent the difference between profit and loss, even between being a viable business or being closed outright. But managing risk can be a difficult thing, and that's where a new step in IBM and Deloitte's long-standing team operation comes into play as the firms bring out a powerful new risk intelligence tool.

5 Building Blocks for a Successful Product Development Partnership
May 20, 2015 - 12:53 PM
More and more these days, product development is approached as a collaborative partnership. Gone are the days when a list of requirements would be sent off to the product development firm with little or no interaction between engineers and industrial designers until it's time to review results.

From Virtualization to the Cloud: Use IT Resources More Efficiently
May 19, 2015 - 3:29 PM
Server virtualization leads to a long-term increase in business agility while providing the foundation for taking the first step toward cloud computing. A growing number of companies are switching to an open source-based hybrid cloud infrastructure and therefore will need tools to manage it.

QLogic and Cavium Joint Infrastructure to Accelerate Cloud Storage Applications
May 19, 2015 - 6:00 AM
A new collaboration between QLogic and Cavium will deliver accelerated performance for enterprises and cloud storage applications by combining technologies from both companies.

Dimension Data, NTT DATA to Create Cloud Migration Services for SAP
May 18, 2015 - 6:19 PM
Dimension Data, a global provider of information and communication technology products, recently announced that it will soon join its sister company NTT DATA to create a new set of services, which can speed up and lower the costs of migrating applications to the SAP cloud.

Global Capacity, Equinix Develop Ethernet Solution that Gives Direct Access to Cloud Providers
May 14, 2015 - 5:49 PM
Global Capacity and Equinix announced recently that they were teaming up on a solution to give customers direct access to the Equinix Cloud Exchange. By using an Ethernet connection instead of public Internet service, customers can have a more direct connection to cloud providers.

Google's New Approach to Enterprise Security: The BeyondCorp Initiative
May 13, 2015 - 6:31 PM
When we think of corporate security, we normally tend to think about firewalls and other tools as means to protect the network. It seems however, that for every person working to ensure that the firewalls hold back threats, there are at least two hackers who have already figured out how to get through.

New SANS Survey Highlights the Risks of Unmanaged Computing Devices
May 13, 2015 - 6:25 PM
Organizations that have a digital presence have come to terms with the fact that eventually they will experience a security breach. The issue is not if it will happen, but how they will react to the breach to minimize the damage. As the threat landscape continues to grow in sophistication and severity, it is essential to take proactive measures that take into consideration the events that will take place before, during and after an attack. A new survey by SANS Institute titled, "Securing Portable Data and Applications on Enterprise Mobile Workspaces" has revealed a large number of corporate and employee computing devices still remain unsecured.

ESI Releases Educational Materials for Resellers
May 12, 2015 - 5:22 PM
Estech Systems (ESI) is known for the cloud-based private branch exchange system it launched in 2014. With that entry, it has begun to shape a new market where the cloud is paving the way for a new type of PBX that does not have to run on a business's premise. Therefore, it is essential for the communications provider to give its resellers the right tools to advance that product.

Xangati Analytics Engine Verified as Citrix Ready
May 12, 2015 - 4:41 PM
Virtualized data centers that support a hybrid blend of private and public cloud infrastructure are becoming more and more common, and organizations are looking for better analytics and insight to support increasingly complex environments. Xangati specializes in providing virtualization performance monitoring as well as service assurance analytics, and the company has just been verified as Citrix Ready.

The Unexpected Costs of Moving to the Cloud
May 12, 2015 - 9:14 AM
A few years ago, companies thought the cloud might help save on costs. No doubt everyone recalls the plethora of articles with titles such as: "How to save time and money in the cloud" or "Cloud Computing can generate massive savings". Analyst studies from leading think tanks from the likes of Booze Allen Hamilton and The Brookings Institute also supported the notion that moving to the cloud will result in massive cost reductions in IT spending.

Is the End-to-End IT Solution from One Vendor the Right Choice?
May 11, 2015 - 9:05 AM
Large organizations should follow a more advanced approach when selecting the required technology and focus not only on the technical side or the initial costs but also on the total cost of ownership and the return on investment. Obviously, this requires advanced resources that perform technical and commercial analysis.

How Can You Tell When a Hacker is Working in Your Email?
May 8, 2015 - 2:23 PM
Email hacking seems to be everywhere these days, with hackers showing no signs of slowing down. Whether you are a large organization or a small or medium sized business (SMB), having your email account hacked can undermine the loyalty of your existing customers, and it can affect your ability to attract and retain new customers as well.

The Road to an Intelligent Infrastructure: First Stop, Automation
May 7, 2015 - 3:21 PM
Although developing intelligent capabilities can be a challenging undertaking, the good news is that the basic elements of intelligent infrastructures are goals that most CIOs have already been working towards: standardization, consolidation, automation, virtualization and service orientation. The business value lies in putting those pieces together into an integrated solution and then managing them effectively to deliver positive business outcomes.

Record Amounts of IT Staff Stressed Out and Considering Leaving Jobs
May 7, 2015 - 12:52 PM
The IT world can be a stressful workplace for many, but the results of a new survey from GFI Software reveal a pretty glum picture. The company conducted its fourth independent IT Admin Stress Survey and discovered that 78 percent of those queried deal with workplace stress, while a whopping 82 percent are thinking of leaving their IT jobs because of stress and dissatisfaction with their working conditions. That number is up from 78.5 percent last year.

Google Creates More Efficient Big Data Solution with Cloud Bigtable NoSQL Offering
May 7, 2015 - 6:00 AM
Managing big data is becoming more and more of an imperative, and organizations are scrambling to find better and more efficient database solutions. Google has been at the forefront of development with its Bigtable initiative, and has now announced Cloud Bigtable, a new NoSQL database solution. Powered by the Bigtable data storage system, the new offering promises to provide single-digit millisecond latency.

Unlocking Israeli High Tech's Secret Advantage
May 6, 2015 - 1:56 PM
Several years after the world first took notice of the economic miracle in Israel, Israeli startups continue to enjoy an astonishing growth trajectory. The Israeli tech sector had its best year ever in 2014, posting a record $15 billion in exits, nearly twice the total in 2013 and three times the country's 2012 combined exit value. The wave of tech startups, innovations and exits is continuing this year.

Businesses Are Adopting 'Digital Employee Software' to Increase Productivity
May 6, 2015 - 12:11 PM
Every company wants to help their employees be more productive, and adopting the most current IT infrastructure is one way to do that. The problem occurs when budgets limit their ability to invest in new technology.

XO Communications Offers Dedicated Links, Security to Azure Cloud
May 6, 2015 - 6:00 AM
The Microsoft Azure cloud computing platform allows businesses to deliver cloud-based applications throughout their enterprises by leveraging the power of Microsoft-managed servers. The creation of Azure has allowed companies such as XO Communications to capitalize on those strengths and offer enterprises dedicated connections to the Azure cloud itself.

CIOs and IT Managers in the Middle East Need to Close the IT Relevance Gap
May 5, 2015 - 12:03 PM
We are entering the era of the "third platform", which also has distinct hallmarks in terms of innovation: Cloud, Mobility, Social, and Big Data are all a part of it. Gartner calls these elements the "Nexus of Forces" and advocates the need for enterprises to become digital businesses in order to survive this next wave of disruption.

Achieving Consistency Across the Data Center's 'Four Footprints'
May 4, 2015 - 1:18 PM
A natural reaction to the ever-growing complexity of enterprise IT is the desire for a consistent management strategy and architecture, especially as infrastructure goes through the metamorphosis it's in right now.

Display Technology Review: Philips' E-Line IPS Monitor Sound, But with Minor Issues
May 4, 2015 - 12:56 PM
Philips is widely known for its audio and visual equipment, from televisions to projectors to home theater gear. But its line of monitors is somewhat less well-known. That's a point that should be addressed in short order, and one that will be: our friends out at Philips sent over an E-Line IPS monitor for us to review, and it has a lot to like. But it's also going to have a couple sticking points to watch out for.

Top 10 Security Concerns
May 4, 2015 - 12:34 PM
In the world of Information Technology (IT) threats are constantly evolving. In some cases the existing threats become more advanced and in other cases new forms of threats are formed.

The Agile User Experience Approach
May 1, 2015 - 3:21 PM
An effective User Experience increases platform adoption, builds affinity for the brand and helps the user prevent mistakes through fault tolerance. A great example of strong UX is the "kill engine" button typically found on heavy machinery. Granted, it's not software, but its size, shape and bright red color imply that even a panicking pencil pusher can smack the machine into full stop when his tie gets sucked into the contraption.

Cloud and Hybrid Business Continuity Solutions Will See More Investments From SMBs
April 30, 2015 - 3:53 PM
For those of you who are old enough to know that carbonite was the mining substance that froze Hans Solo (look up the reference if you do not know it), you can now associate the name with a company known as an online backup service, available to Windows and Mac users, that backs up documents, e-mails, music, photos, and settings. Yes it was named after the fictional substance used to freeze Han Solo.

Appian Finds that Business Execs and IT Disagree on Custom Software Investment
April 30, 2015 - 10:30 AM
Custom software drives businesses across all markets, and both business executives and IT decision makers appear to know the value of such software. Both groups, according to a recent study by Harris Poll on behalf of business process management software developer Appian, believe that custom software is driving innovation in technology and allows businesses to easily make software enhancements, deliver better customer service, and run efficient operations. Where they disagree, however, is in how to invest in custom software.

Hosting Cheat Sheet
April 30, 2015 - 10:12 AM
Companies have many options when it comes to choosing the hosting option that best meets their needs-from getting started to long-term viability. These options range from cloud hosting to managed hosting to a do-it-yourself approach.

Cloud X Fusion Offers Direct Access to Google Cloud Platform
April 29, 2015 - 12:01 PM
As the owner of the world's largest private undersea cable system, spanning more than 67,000 route kilometers (41,000 miles plus), Global Cloud Xchange (GCX) has introduced Cloud X Fusion, which allows enterprise grade connectivity with direct access to Google Cloud Platform.

Russian Hackers Have President Obama's Unclassified Emails
April 28, 2015 - 10:32 AM
No one has to convince the Obama administration that hackers are posing a problem to everyone in the world. The administration has been actively trying to make sure that those who are acquiring ill-gotten information are not profiting. All of this is in addition to recent revelations that Russian hackers who were able to access the White House's unclassified computer system actually read some of President Obama's email correspondences.

Undocumented System Changes on the Rise, Putting IT Infrastructure at Risk
April 27, 2015 - 6:42 PM
An alarming trend among large enterprises that poses a major security risk has been revealed by a new survey from Netwrix Corporation. The company queried 700 IT professionals from more than 40 industries and discovered that 70 percent of organizations simply forget about documenting changes, up a whopping 57 percent from last year.

IBM's QRadar Offers Better Detection of Cyberattacks
April 24, 2015 - 12:32 PM
With so much of our lives online these days, the ability to protect against cyberattack is as important now as a night watchman was in the days before the Internet. Protecting assets and protecting property against vandalism or destruction were all important tasks, and such tasks now have Internet equivalents. Enter IBM, whose QRadar system now powers analogues to the real-world watchdog, using analytics technology to find potential cyberattacks and prompt reaction.

5 Things Enterprises Didn't Know They Could Automate
April 22, 2015 - 3:09 PM
IT automation isn't new, but it's found its way into some of the most innovative aspects of computing today. Beyond managing repetitive tasks such as job scheduling, automation can now streamline processes across the enterprise, leaving IT teams with more time and resources to focus on the big picture. Read on to see how you can automate these 5 IT processes:

The Gap Between Perception and Reality of Perimeter Security Effectiveness
April 20, 2015 - 9:31 AM
Information systems have always been subject to attacks and breaches. Some tend to go under the radar, while others attack information that is not of any use, but the unfortunate fact is that they happen. A couple of Christmases ago this was really brought to light when Target was breached, and hundreds of customer accounts were accessed.

DNS Security and Cloud Network Automation: Two Imperatives for Middle East Service Providers Today
April 20, 2015 - 8:46 AM
Service Providers in the Middle East today are putting a lot of investments into two technology areas - Security and Cloud Computing.

Cyber Threat Week in Review
April 17, 2015 - 1:32 PM
Next week is the annual RSA gathering of security professionals in San Francisco. This can only mean two things.

Is SSL Hurting More Than Helping Middle East Organizations?
April 16, 2015 - 7:33 AM
Regional security expert sheds light on SSL encryption that is being commonly used by organizations in the country

Eight Key Factors to Lead You to a Successful Hybrid IT Environment
April 14, 2015 - 1:04 PM
IT Transformation is far more than moving some workloads and apps to a public cloud provider. Transformation is about learning to manage technology and business relationships in new ways. No longer are you solely managing within the confines of your own data center. You now function with support from different sources and locations, provisioning without IT intervention, introducing new apps without solid business cases and line of business (LoB) users provisioning their own workloads.

The Hybrid IT Enterprise Demands an End to Network Guessing Games
April 14, 2015 - 6:00 AM
Although enterprises are increasingly adopting cloud computing and SaaS-based applications, the bell has not tolled for on-premises IT. As a result, enterprises are creating hybrid infrastructure stacks that present a new set of challenges for IT, including an increased risk of costly data breaches, and architectural "collisions" where design patterns for on-premises development and deployment don't translate well (or at all) into cloud.

How Safe are your Email and Attachments? Can They be Found but not Lost to Bad Guy Actions?
April 13, 2015 - 5:28 PM
There are two really interesting phenomena at work when it comes to enterprise data. I hesitate to call them trends since what they really happen to be are business imperatives. Unfortunately, many times that can seemly contradict each other.

Is 2015 the Year of a Data Dystopia?
April 13, 2015 - 10:42 AM
The recent news headlines about cyber attacks and data breaches can't help but feel a bit too dystopic for comfort. The start of the year has prompted the question: Could our data be headed toward a dystopian future?

IDT Corporation Uses Hexadite to Accelerate Incident Resolution and Improve Security Operations
April 13, 2015 - 10:34 AM
When it comes to incident response (IR), enterprises end up wasting 80 percent of their resources because it takes much longer than it should to address attackers in their networks. This is because they've been trying to utilize people in ways that systems can automate instead of having them focus on the tasks that truly require human intelligence and interaction.

New Supercomputer Will Cost Energy Department $200 Million
April 9, 2015 - 6:05 PM
Argonne National Laboratory is a science and engineering research laboratory located near Lemont, IL. By size and scope, it is the largest national laboratory in the Midwest, and the initial inception of Argonne was to carry out Enrico Fermi's work on nuclear reactors as part of the Manhattan Project.

A Small Startup's Secrets to Scoring Big Name Clients
April 9, 2015 - 11:58 AM
Just a few big name clients can make or break a startup in the enterprise space. Landing business from Fortune 500, or even 100, corporations gives young companies validation and legitimacy, not to mention revenue. However, it is extremely difficult to land these clients as a small startup. Large corporations with large budgets also come with large needs, which means their CIOs and IT buyers are understandably skeptical that startups are up to the task.

Seeing the Light: How File Analysis Tools Can Unleash the Light in Dark Data
April 9, 2015 - 11:28 AM
Dark data is a relatively new term to the industry, defined by Gartner "as the information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes (for example, analytics, business relationships and direct monetizing)." Almost all organizations have volumes of dark data stored away in dusty vaults and off-site storage facilities that is historically unaccounted for, unmanaged, and undervalued.

Want to Buy a Corporate Password? Ask a Current Employee
April 8, 2015 - 12:40 PM
Passwords these days are a tricky thing. Sometimes passwords just aren't strong enough, and it can be difficult to keep track of all the various passwords used and when these should be changed. But there aren't many out there who'd be willing to sell an email password to a potential bad actor, at least, until the issue of work passwords comes up. Then it becomes of a different animal, and one that may pose a big problem for companies.

Looking For Better Cybersecurity? HP Has Some Answers
April 8, 2015 - 12:21 PM
With the sheer number of high-profile data breaches taking place lately-some even called 2014 the year of the data breach-it's only natural that companies would be looking for ways to improve cybersecurity. While there are plenty of methods out there to bolster the security measures, HP has an idea that might sound a little novel, but has a surprisingly rational basis.

Manage What You Measure with IPDR
April 8, 2015 - 11:08 AM
Cable providers are facing challenging times - and there's no quick fix in sight. The surging popularity of over-the-top (OTT) content is one of the biggest sources of additional bandwidth, with Netflix now accounting for more than one third of all downstream Internet traffic during peak hours in North America. It's no wonder, then, that bottlenecks form during evening hours and deteriorate service quality.

Swiss Re to Work with HWind Scientific to Develop Parametric Insurance Policies
April 8, 2015 - 8:53 AM
According to the insurance industry website Artemis, Swiss Re recently announced that it would be working with HWind Scientific to create a new set of parametric insurance and reinsurance products based on analysis of data from U.S.-based hurricanes and tropical storms captured by HWind. The new products are designed to speed up the process of paying out claims.

How to Build a Sustainable Storage Infrastructure
April 7, 2015 - 3:53 PM
In our personal lives we tend to love "how to" guides. In fact, one of the big trends of the past few years has been the raging interest in do-it-yourself (DIY) capabilities ranging from cookbooks to building your own airplane. The same has been true in the business world where the "For Dummies Books" have been a staple for years. In fact, it is how I became Microsoft Office proficient.

Open Source or Open Core: Why Should You Care?
April 7, 2015 - 12:58 PM
It is no secret that open source communities and projects are a different breed of development. Different people drive them. Some have a benevolent dictator, and others are driven by like-minded individuals. What is common is that the participants have an itch to scratch. They were dissatisfied with the status quo, driven by a meritocracy, and wanted to shake the constraints of a slowly evolving proprietary software environment. Quality of code and contribution drove what ended up in a product release, and transparency in software development is now a default in many modern enterprises.

What You Need to Know When moving Apps to the Cloud and SLAs
April 6, 2015 - 10:23 AM
It's no secret that many businesses are already moving their productivity applications to the cloud, or they are considering it at least. In Microsoft's latest earnings release, for instance, the company reported a whopping 114 percent rise in business cloud revenues in the second quarter of its fiscal year alone. That growth is being driven by Office 365, Azure and Dynamic CRM Online adoption, and represents an annualized revenue run rate of $5.5 billion.

30 Percent of Potential Cybercrime Victims Plan to Negotiate
April 6, 2015 - 8:51 AM
It's one thing to stand up and make bold pronouncements about how there will be no negotiation with terrorists, in the grandest action movie tradition, but when it comes to cybercrime, the actual response could be much different. A new report from ThreatTrack Security suggests that almost one in every three security professionals would sooner negotiate with cybercriminals who hold data hostage, whether the data has simply been encrypted or has been outright stolen.

CompuCom Announces New Network, Cloud and Mobile Access Solutions
April 6, 2015 - 8:45 AM
CompuCom, already one of the leading technology infrastructure services companies in the world, has just announced brand new Network Access, Cloud Access and Mobile Access Solutions. These new solutions were primarily created in house by CompuCom but they were developed through the AT&T Partner Exchange program.

Blueprinting: The Administrator's Best Tool for Control, Compliance, and a Good Night's Sleep
April 6, 2015 - 8:03 AM
Cloud blueprints are often likened to architectural blueprints-both describe how a design is to be built reliably, consistently, and efficiently. Sounds like a winning idea for cloud administrators, who struggle (often unnoticed) every day with career make-or-break issues like IT management, governance and cost control.

Building the Right Cloud Can Be a Simple Process
April 2, 2015 - 3:56 PM
That's a huge variety of options right there, so it's not surprising to see that there would be hesitation on the part of businesses to bring this tool into operation. Surely most reasonable business owners would see that, with so many different choices available, the chances of getting one that's less than optimal is fairly strong. Thus it becomes extremely important to consider all the various aspects involved to reduce the chances of getting a system that doesn't fit the organization's needs.

Data-Centric Security: Keeping Email Secure and eDiscovery Easy
April 1, 2015 - 12:03 PM
Despite all the chatter (pardon the pun) regarding the importance of social media to enterprises these days, the way business gets done is and will remain rooted in email exchanges. In fact, as studies have indicated enterprises receive, create and store more and more email data each year as mission critical information increasingly is in electronic formats. In addition, while almost everything is not digitized, much of it never gets printed and put in a physical file, but rather is electronically stored so it can be easily accessed from a variety of needs including for legal and audit purposes.

Wheelings & Dealings: HGS Acquires Colibrium to Boost Healthcare Offerings
April 1, 2015 - 9:00 AM
Hinduja Global Solutions (HGS), an Indian provider of business process outsourcing (BPO) services, has acquired U.S.-based Colibrium Partners and Colibrium Direct (Colibrium), a provider of sales automation and customer relationship management (CRM) solutions for the health insurance industry. Under the terms of this agreement HGS now owns an 89.9 percent stake in Colibrium, while its founders will retain 10.1 percent.

State Farm Drone Aircraft Cleared for Flight
March 30, 2015 - 11:03 AM
Package delivery or military applications are the first things that come to a lot of minds these days when the topic of drone aircraft is brought up, but there are other applications for these tools that don't involve moving things from one place to another, be it books or bombs. State Farm recently received Federal Aviation Administration (FAA) clearance for one such use: camera-mounted unmanned aviation systems (UAS), otherwise known as drone aircraft, in assessing damage to property.

Automated DRM for Database Management and Business Continuity
March 27, 2015 - 10:27 AM
Having continuous access to corporate data is critical for any business, as even a short interruption can cause significant financial loss. There are plenty of threats businesses face when it comes to ensuring that systems and data can be recovered in the event of a disaster, natural or not.

Wheelings & Dealings: Apple Buys FoundationDB, Promptly Shutters It
March 27, 2015 - 6:00 AM
Apple has acquired FoundationDB, a company that makes back-end data processing for cloud services a lightning-fast affair. It also has appeared to have closed down the startup as soon as the sale went through.

Huawei, SAP Power Sinopec Financial Data Warehouse
March 26, 2015 - 6:03 PM
Energy and chemical giant Sinopec, which has the world's largest data warehouse, has tapped Huawei for the hardware and SAP for the data warehouse technology to power its financial reporting system.

Unsecured Email Is One of Our Largest National Security Threats
March 26, 2015 - 2:55 PM
While Hillary Clinton, Marco Rubio and Jeb Bush scramble to assure reporters that their use of personal email for government business was secure, the verdict isn't in yet on whether computer security experts agree. We do know the practice of using personal email for business - whether in the political or corporate world - is widespread. Unfortunately, using private or hosted email is almost exactly like sending one's private emails as postcards in the U.S. Mail: any attacker can easily get the email and read it.

Making the All-Flash Data Center a Reality, Part 2
March 24, 2015 - 7:47 AM
Part one of this article discussed the rise of flash storage due to its drop in price and superior performance. Part two describes how software-defined storage fits into the all-flash data center and synergies created by using these technologies together.

OPSWAT Tackles Email Malware with New Agent for Metascan Threat Prevention Solution
March 23, 2015 - 2:56 PM
The number of cloud-based services and applications being used by small businesses and enterprises alike has caused malware rates to skyrocket, with businesses scrambling to protect their sensitive data and their users. In fact, a recent survey from managed IT infrastructure provider OPSWAT shows that more than half of respondents had an email malware breach in the last 18 months.

Making the All-Flash Data Center a Reality, Part 1
March 23, 2015 - 8:11 AM
As the cost of flash storage continues to drop, the concept of the all-flash data center becomes more realistic. Many organizations are faced with storing not only their legacy data but the huge volumes of data being generated by the Internet of Things as well. Cisco states that almost half a billion mobile devices and connections were added in 2014, raising the total of global mobile devices and connections to 7.4 billion. The company predicts that global mobile data traffic alone will increase nearly tenfold between 2014 and 2019, reaching 24.3 exabytes per month by 2019.

Comings & Goings: Anurag Gupta Appointed Director Customer Service Operations for Xerox India
March 20, 2015 - 7:29 AM
Xerox announced recently that Anurag Gupta had been appointed Director Customer Service Operations for Xerox India (XI). Gupta, who has been with XI nearly 30 years, was previously the head of field service operations for the company.

Keeping Small Businesses' Networks Current and Secure
March 19, 2015 - 4:57 PM
The technology that enables our businesses evolves so often that it is seemingly obsolete just when you think you have it deployed and operating properly. But keeping your technology current and taking advantage of innovations and advances, especially as an SMB, is a "must have" to remain competitive in a digital age. With all this new technology promising immediate and dramatic results, one aspect that can easily be overlooked is keeping the core network current and secure.

Government Entities in Middle East Need Modern Security Solutions to Combat Modern Cyber Crime
March 18, 2015 - 10:02 AM
The Middle East has some very specific threats facing government entities. These come from regimes opposed to our politics as well as those wishing to benefit from industrial espionage. Meeting these concerns is a difficult task and one that requires a multilevel approach to security, which provides strength in depth. At the perimeter, securing services with DNS Firewall and 'Volumetric Attack Prevention' is critical; internal threats are more difficult to counter.

Penetration Testing: Is the End in Sight?
March 17, 2015 - 8:58 AM
With the attack surface, or perimeter, expanding exponentially, and attackers inside the network, the focus should now be on finding and stopping them-concentrating on how data leaves the system.

Effective Asset Management is the Key to Homeland Security
March 12, 2015 - 9:44 AM
Kevin Deal, Vice President Aerospace & Defense at IFS North America, looks at how new agile, cost-effective Software as a Service (SaaS) solutions are helping modernize service delivery for public services to get the most from their resources and save lives.

IT Needs Management Tools to Keep Up with Cyber-threats
March 9, 2015 - 5:32 PM
When it comes to the top cybersecurity technology concerns of IT managers, new research has revealed a need for management tools that streamline processes and save time, such as automation, to be better equipped to keep up with the evolving threat-scape.

DNS, DHCP and IP Address Management Grows into its Own
March 9, 2015 - 4:44 PM
The area of DNS, DHCP and IP address management (DDI) is seeing organic expansion, with initial small deployments becoming an enterprise-wide phenomenon.

GoDaddy is Just One of the Dominoes That Doesn't Have to Fall
March 9, 2015 - 2:45 PM
The GoDaddy customer breaches didn't have to happen and don't have to happen to you.

How to Manage Your Workloads in the Cloud
March 6, 2015 - 10:59 AM
The cloud is no longer a fad. According to the Cisco Global Cloud Index, 78 percent of all workloads will be processed in cloud-ready data centers by 2018.

The Top Cloud Technology Concerns Can Be Addressed Through Education
March 4, 2015 - 5:27 PM
It's well known that while organizations are aware of the cloud and its many benefits, they have concerns when it comes to actually adopting cloud-based solutions. Service providers are stepping up to the plate to head off those fears by better educating customers and prospects about cloud services and security, which has helped organizations of all sizes as they slowly migrate to the cloud.

The Expansion of Process into Workflow: What it Means for Your Business
March 3, 2015 - 4:06 PM
In today's global, mobile landscape business processes have become extensive and complex, reaching all kinds of mobile systems, data, content sources and devices. Businesses in this environment demand a coordinated way to connect all of these varied components and extend them to new places. As a result, what were once isolated business processes are now being united into workflow, a new category that is shaping the way businesses get everyday work done.

Improving Control of Virtual Machines
March 3, 2015 - 2:16 PM
Server virtualization is a darling of IT administrators for a number of reasons: it delivers more efficiency and cost control than adding physical servers to accommodate the data explosion. It offers savings due to server consolidation, at the same time giving enterprises valued flexibility and scalability, and promises to make the transformation to cloud architectures, whether private or hybrid, faster and simpler.

Allot Buys Cloud-Based Security Firm Optenet
February 26, 2015 - 5:07 PM
Allot Communications Ltd. this week announced it is buying security company Optenet for $5.5 million.

Putting 2014, 'The Year of the Breach' into Context
February 26, 2015 - 11:04 AM
With an average of more than two breaches occurring every day, the headlines begin to sound like an overwhelming, broken record. To take these huge numbers out of the abstract and give the breaches some context, they will be compared to human populations.

Ipanema Technologies Appoints Ben Heisler as Senior Vice-President of Sales in the Americas
February 25, 2015 - 12:58 PM
Ipanema Technologies announced it has appointed Ben Heisler as Senior Vice-President of sales in the Americas. An industry leader in network solutions, Ipanema provides enterprises with the solutions they need to guarantee business application performance, regardless of IT complexity.

Hyperconverged and Hyperscale: A New Day in Storage Dawns
February 25, 2015 - 9:57 AM
As data rapidly increases in today's information-based economy, storage demands are increasing right along with them. The cost of hardware alone makes it too expensive to build out traditional storage infrastructure, making its rate of scale too slow to be an effective option. Being able to expand rapidly is a key element of any organization's growth strategy. Enterprises today need flexible, scalable storage approaches if they hope to keep up with rising data demands.

Microsoft Moves Quickly to Remove Potentially Dangerous Adware From Lenovo Computers
February 24, 2015 - 12:31 PM
Malware and hackers have become such a problem for the computer business and computer owners that it almost seems like a new story pops up every day. While hackers and malware used to confine themselves to attempting to get into home computers or business hubs, networks have been the name of the game most recently. That doesn't mean these baddies are leaving home computers alone entirely. Most recently reports began surfacing that Lenovo had left its computers vulnerable thanks to preinstalling an adware program called Superfish Visual Discovery.

Wheelings & Dealings: NS-Technologies Acquired by Dialogic
February 23, 2015 - 4:43 PM
Without standardization, we end up with a combination of various and usually disparate networks. Dialogic, Inc. is one company whose goal is to boost the reliability of any-to-any network connections. Dialogic is able to efficiently connect these disparate networks through an assortment of networks and networking protocols that include IP, SIP and IMS.

When Gaming Isn't A Game: Three Best Practices to Protect Your Hosting Service Against DDoS Attacks
February 23, 2015 - 11:41 AM
The unprecedented number of security breaches, hacks and DDoS attacks on gaming communities, software manufacturers and even Hollywood studios grew to epic proportions in Q4 of 2014. Gaming sites and their hosting providers are particularly susceptible, and you don't have to be a giant in the industry to be affected. In this article, we will explore why gaming sites are so hard-hit and how hosting providers can most effectively defend themselves.

Equation Malware Unstoppable Until Hard Drive Is Destroyed
February 19, 2015 - 7:58 AM
While there are all kinds of different malware threats out there these days, one has risen above the rest to become the most feared. A cyberespionage group that has a skill set very similar to that of U.S. Intelligence agencies, has managed to get into key installations in both Russia and Iran using a form of malware that is so destructive and so dangerous that destroying the hard drive is the only way to stop its spread.

NetSwap Launches for Local Backup for Amazon S3, Google Cloud
February 18, 2015 - 5:24 PM
Storage specialist Highly Reliable Systems has released the NetSwap family of network-attached appliances, which provide reverse-cloud server backup for several bigwig data storage environments, like Amazon S3, Google Cloud Storage, DreamHost DreamCloud and Dropbox.

Rethinking Network Acceleration in a Third Platform World
February 18, 2015 - 8:12 AM
In order to enable a more robust network in today's fast-paced environments and stay ahead of the ever-expanding data growth curve, network management and security appliances will now, more than ever, need to remain in front of advancing network speeds to ensure apps run quickly, videos stream smoothly and end-user data is secure and accessible.

The Year of Threat Intelligence Sharing: Bringing Structure to the Chaos of Big Security Data
February 17, 2015 - 3:19 PM
?We've seen the security ecosystem evolve from all-in-one systems to point solutions to a bi-directionally integrated fabric knitting these silos together. This year that will extend into community-based, big security data digesting TIP systems.

Pulse Supply Delivers Solutions as Well as Product
February 17, 2015 - 12:41 PM
In businesses' hyper-connected world today, many are having trouble simply keeping up, yet alone getting ahead. Technology is moving so fast that some companies are getting left in the dust. That's where Pulse Supply steps in.

Docker Adoption is Ahead of Schedule
February 12, 2015 - 5:37 PM
As virtualization and container apps continue to catch fire in the enterprise, a new survey has revealed that Docker adoption in particular is ahead of schedule, just four months after exiting stealth mode.

Comings & Goings: WHOA Names New Chief Strategy Officer
February 11, 2015 - 7:43 AM
It is clear to see why WHOA is ecstatic about the hire; Varma's results speak for themselves. Over his eight years with Peer 1, he was integral in increasing the company's revenue from $35 million to nearly $200 million at the time of his departure.

ePlus Technology Receives Cisco Customer Satisfaction Award
February 10, 2015 - 6:11 PM
ePlus Inc. announced today that one of its subsidiaries has received a Cisco Customer Satisfaction Excellence Gold Star for its performance of customer service as a Cisco partner.


Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter