Information Technology Editor's Pick


Subscribe to the InfoTech eNewsletter

Editor's Pick

U.S., U.K. Preparing to Tap British Citizens
February 11, 2016 - 9:53 AM
Edward Snowden and his disclosures have raised the level of awareness about government surveillance in the digital age. The stories that used to get unnoticed or very little press are being highlighted, and most people around the world now have a keen interest to what extent their government will go to violate their privacy, with or without consent.

Cato Networks Launches Network Security as a Service
February 10, 2016 - 3:43 PM
Cato Networks has announced its Network Security as a Service (NSaaS) to enable businesses to secure their networks easily.

The '80/20 Rule' for Standardizing Software
February 9, 2016 - 4:20 PM
When Enterprise Resource Planning software was first introduced to help integrate and streamline the key business functions of an organization, many large companies adopted and licensed the sophisticated software new to this space. They understood that standardizing processes and the software that drives their back-end operations would result in economies of scale, efficiency, and the ability to grow more rapidly. By limiting customization and adopting best practices they could also speed innovation, reduce costly reconfiguration expenses and more rapidly develop markets and their customer base.

451 Research Delivers Intelligence on the Voice of the Enterprise
February 9, 2016 - 3:48 PM
Nikolay Yamakawa of 451 Research sat down with TMC's own Rich Tehrani at the recent ITEXPO in Ft. Lauderdale to explain what his company brings to the table.

Data Science to Benefit from Huge New API Availability
February 9, 2016 - 2:45 PM
Who can doubt the impact that big data projects are having on society? Taking advantage of the rapidly growing heaps of data currently available, big data in all its forms is taking that data and helping businesses and others turn it into actionable insight. Several new applications programming interfaces (APIs) have emerged to help make that a little smoother, and a recent look at the field suggests some of the best ones.

Conjur Launches Version 4.6 of Security Orchestration Software
February 9, 2016 - 12:12 PM
Conjur, Inc. recently announced some new enhancements to its popular security orchestration software, focused primarily on helping businesses transition their infrastructure to the cloud while maintaining integrity and security.

Amazon Web Services Gives Game Developers New Slate of Integrated Services
February 9, 2016 - 12:07 PM
ame development has never had such potential for reward before; today, it's possible for a developer to hit on a concept that could be the next big revolution, and generate huge amounts of revenue. Angry Birds was sufficient for not only a cartoon series but its own amusement park. Minecraft meant $2.5 billion to Microsoft. So game developers are eager to get behind new tools that might help them make the next big game. That's where Amazon Web Services comes in, with a slate of new tools designed to improve performance and help game makers succeed.

Infoblox Combines Threat Intelligence, Network Context with IID Acquisition
February 9, 2016 - 11:32 AM
Network control company Infoblox has enhanced its capabilities through the acquisition of IID, a privately held global cyber threat intelligence company. According to Infoblox, the acquisition of IID is a synergistic move that makes Infoblox the first enterprise-grade DDI (DNS, DHCP and IP address management) vendor that combines contextual network data with federated threat intelligence, along with a dedicated threat research team, to provide context-aware security that uses infrastructure customers already have in place.

Absolute Logic Acquires Cloud9-IT
February 8, 2016 - 3:21 PM
Technical support and consulting firm Absolute Logic has announced that it has acquired Cloud9-IT. The financial terms of the deal for the firm that specializes in serving accounting, dentistry and manufacturing terms in Connecticut and New York.

Cybersecurity Training Center Opens in Boise
February 8, 2016 - 2:22 PM
Crime in the 21st century has transformed as criminal operations have moved into the realm of the digital world. With each passing year, the stakes get higher while the challenge of cyber security gets harder. Cyber Crime Forensics, LLC (CCFTC) has launched the Cybercrime Forensics Training Center in Boise Idaho, to meet the growing need for skilled practitioners in this continuously threatened computing environment.

Protection from Hidden Threats at the Heart of New LGS Innovations Service
February 8, 2016 - 11:54 AM
Data network products are all around us, carrying and often helping to shape network traffic that travels from point to point. Security measures in this widespread base of technologies cover the spectrum, and few even consider the element of device-based source code, much less do anything about it. That has changed with a new product from LGS Innovations. CodeGuardian is the company's product, and it is designed to protect the millions of lines of source code that are found in network switches and routers around the world.

Tackling the SSL Encrypted Traffic Blindside
February 5, 2016 - 2:21 PM
SSL/TLS encrypted network traffic needs to be managed much like an NFL pass rusher. SSL/TLS encryption is widely used to secure communications to internal and external servers, but can blind security mechanisms by preventing inspection of network traffic, increasing risk.

Amdocs Updates Kenan and C1 Solutions
February 5, 2016 - 10:56 AM
For businesses, a lot of the time choosing the right solution means choosing a solution that will receive long term support from the solution's provider. After all, putting the time and effort into choosing a solution only to have to replace it entirely in only a handful of years effectively makes that solution a bad investment. Fortunately for Amdocs customers, the company knows this well.

Synoptek Purchases EarthLink IT Services Division
February 4, 2016 - 3:54 PM
Telecommunications company EarthLink, in an attempt to pare down its business and focus its efforts as an organization, has sold its information technology division to Synoptek.

Greentree Logistics Streamlines Accounts Receivable with VersaPay Automation Solution
February 3, 2016 - 2:07 PM
Greentree Logistics, the brokerage division of the diversified for-hire transportation company Greentree Transportation, recently announced its plan to implement an accounts receivable automation solution from VersaPay Corporation, a company specializing in cloud-based invoicing, accounts receivable management and payment solutions.

IntelliChief Improves Enterprise Content Management
February 2, 2016 - 3:48 PM
Digital technology has rendered paper redundant. The amount of resources it takes to use paper is costly in terms of human and financial capital. In that vein, IntelliChief, a provider of enterprise-class automated document management and workflow solutions, just announced the advanced release of Enterprise Capture, its front-end document capture program that is part of the company's enterprise content management (ECM) platform.

5 Ways Government Agencies in the Middle East Can Fight State-Sponsored Cyber Attacks
February 1, 2016 - 10:35 AM
State-sponsored cyber-attacks strike with shocking frequency. The motives, methods and results of these state-sponsored attacks vary, but the implications are clear: Every organization that stores sensitive information has a proverbial bullseye on its back. Well-funded and extremely efficient, with seemingly unlimited resources and talent at their disposal, state-sponsored cyber-criminals would appear to be an unbeatable foe.

High Performance Computing Market Driven by Investment
February 1, 2016 - 9:35 AM
There are a number of factors pushing the demand for high performance computing to greater heights. Advancements in cloud computing, convergence of big data, development of new technologies and solutions for embedded processors, hot water cooling, and non-volatile memory are meeting the demands of this growing market. High profile companies and governments compete with massive budgets and massive needs.

Transforming Your Business with Fast Data
January 29, 2016 - 10:06 AM
In today's business environment, companies must be ready to analyze and leverage business data that accumulates with every business step they take. Real-time data changes the way companies do business, making some analytics methods obsolete and creating space for new solutions and strategies. It goes without saying that real-time data is too valuable to be ignored. The extent to which companies will be able to benefit from it depends on the kind of resources they already have and their willingness to face new challenges.

Sinequa Expands Smart Connectors for Big Data and Cloud Environments
January 29, 2016 - 9:39 AM
Extracting information from the applications deployed by large enterprises can yield valuable insight. As provider of real-time big data search and analytics, Sinequa has new additions to its smart connectors for cloud and Big Data Hadoop environments.

IHS Report Describes Devastating Costs of IT Downtime
January 29, 2016 - 8:25 AM
IHS recently released a report describing the effects of IT downtime, and the news is not good. In North America, these costs total about $700 billion annually, which is larger than the gross domestic product of all but 20 of the top countries in the world.

Report: Phishing Attacks More Personalized in 2015
January 28, 2016 - 3:08 PM
Wombat Security Technologies recently announced its latest report on phishing attacks, State of the Phish 2016. Among the key results in the report was that these attacks are becoming more sophisticated and personalized in an effort to induce unwary users to click on malicious links and attachments.

MegaPath Further Incentivizes Partners with Top Partner Club Program
January 28, 2016 - 9:52 AM
It seems that the new year is the best time for companies to revamp or retool their partner programs. After all, it's barely been a week since 3CX revamped its PBX Partner Program with more rewards and greater transparency and now MegaPath has made a similar announcement.

Infoblox Reveals the Hidden Value of Core Network Services Data
January 28, 2016 - 9:42 AM
The complexities of today's networks require solutions that are able to keep track of what is happening in the infrastructure at all times. With uptime and reliability the cornerstone of proven service providers, not having a predictable network infrastructure is a sure fire way to lose customers. The Infoblox Reporting and Analytics solutions looks to give operators new insights by unlocking the hidden values of core network services data.

5 Overlooked Secrets of a Successful VDI Global Deployment
January 28, 2016 - 8:33 AM
Before we dive into what you must do before you roll out VDI, let's examine the unique characteristics of VDI.

MRV Receives TMC 2015 Data Center Excellence Award
January 27, 2016 - 2:30 PM
TMC has awarded packet and optical solutions provider MRV Communications a 2015 Data Center Excellence Award winner for its OptiDriver platform.

2015 Was a Big Year for VeloCloud
January 27, 2016 - 2:23 PM
Just yesterday, we heard how VeloCloud was hitting ITEXPO to show off its advances in the field of software-defined wide-area networking (SD-WAN). That alone would be big news, as the company's vice president of marketing Michael Wood joined a panel to show off the rise of the SD-WAN, but hot on its heels is word about VeloCloud's exciting 2015 results.

Accenture EPIC Portal Improves Efficiency via Data Consolidation
January 27, 2016 - 2:19 PM
Global professional services company Accenture has had a remarkable month. So far in January, the company bolstered its cloud services through the acquisition of CRMWaypoint, a supplier of cloud advisory and technology services, followed by an unprecedented collaboration with SAP. Following that up, Accenture has launched a digital portal meant to help product developers accelerate delivery of products to market at lower costs through improved efficiency.

Microsoft Has Open Sourced its Computational Network Toolkit
January 27, 2016 - 2:06 PM
The quest to have a technology listen and talk like human being has been a long one, but we're getting close. Artificial Intelligence or AI has evolved into a standard offering on the devices we use every day. The most recognizable example is the virtual/personal assistants, such as Apple's Siri and Microsoft's Cortana, currently deployed in smartphones and computers. Now, the need for more development and innovation has led Microsoft to open source its Computational Network Toolkit, or CNTK.

VMware's Q4 2015 Report Brings Layoffs, CFO Departure
January 27, 2016 - 10:51 AM
Not even a week after reports landed that VMware may be planning to cut around 900 jobs, or about five percent of its workforce, the company has gone ahead with its plan. Contrary to initial speculation, however, VMware cut 800 jobs. In addition, company CFO and COO Jonathan Chadwick is leaving the company. He reportedly plans to expand his advisory roles, working with a number of companies as a non-executive board member.

Mesa County Taps SoftWatch For Cost Controls, Google Apps Use
January 26, 2016 - 10:32 AM
License spending is something that responsible companies must watch carefully. Buying too many licenses for software items is unnecessary overspending and wastes resources. Buying too few, meanwhile, invites potential legal trouble or a hefty unexpected bill. Mesa County in Colorado, meanwhile, is turning to SoftWatch to not only help focus its software budgeting but also help drive the use of Google Apps.

Smaller Devices and Motion Sensing: Is This the Future of Smartphones?
January 26, 2016 - 9:26 AM
Elliptic Labs is setting out to change the mobile marketplace with their new BEAUTY Ultrasound Proximity Software. Not only does this software aim to replace extra sensitive hardware-based sensors, but it will do so while causing the price of smartphone manufacture tot drop significantly. This would cause the pricing model of smartphones to change exponentially and marketplace competition to really get dirty.

Software Defined Storage from Nexenta and ATTO
January 25, 2016 - 10:00 AM
ATTO Technology has combined with Nexenta to provide a joint SDS solution which earned the 2015 InfoTech Spotlight Data Center Excellence Award from TMCnet. The product is known as NexentaStor MetroHA, and it is configured as a stretch cluster which provides synchronous storage and high availability across multiple data centers.

Wheelings & Dealings: The Key to Data Opportunities May Be in the Web Itself
January 22, 2016 - 8:51 AM
An announcement from a new company called let the world know of a 13 million dollar venture capital round of fundraising. The company converts information about websites into actionable intelligence and utilizing the power of cloud to make the consumption of web data simple to implement. The idea is that the acquisition of this data can exert a powerful competitive edge and business insight that was not easily achievable before.

The Relationship Between the Finance and Security Departments
January 20, 2016 - 3:19 PM
Within a corporation there are many facets to interdepartmental communication. The most interesting dynamic is the relationship between the finance and security departments. Security departments don't typically generate income, and as a result is looked upon differently when compared to other departments. It's difficult to place a specific dollar value on what the security department is worth, when in reality the security department protects the entire company and the money invested in this department allows them to have the resources to achieve this goal.

The New Security Frontier - Securing Enterprise Infrastructure and Data from DNS-based Threats
January 20, 2016 - 2:26 PM
Given that DNS servers are mission-critical infrastructure, it is crucial that they continue to respond to queries even when they are under attack. When designing a DNS infrastructure, it is important to build an environment that is not only sufficient for current needs, but also provides room for future growth. In addition, while architecting the DNS, it is also important to understand the security threats the DNS might be vulnerable to.

Stay Ahead of the IT Curve: How IT will Disrupt in 2016
January 20, 2016 - 9:33 AM
The largest hotel company in the world owns no physical rooms. The largest passenger service in the world does not own a single car. Unlike the technology that has created a plethora of products and functions for consumers and businesses, Airbnb and Uber are bringing technological disruption to delivery models. And in 2016, the information technology sphere will continue to accelerate a trend developed over the last several years. The IT offerings that businesses purchase will not change, however; how those products and services are purchased will be considerably different.

Damballa and Interface Form Partnership to Increase Network Security
January 19, 2016 - 4:00 PM
The growing demand of cloud computing, as well as smart mobile devices, streaming services, the IoT and always being connected have increased the amount of traffic on existing networks. In addition to the content, enterprises, telecoms and network operators also have to face the very real security threat that is currently plaguing the digital landscape. In order to provide greater network security, Damballa and Interface Masters have formed a partnership to create a comprehensive solution designed to protect 1G and 10G network links.

NuScale Again Upgrades Wireless Network With Aruba
January 19, 2016 - 2:01 PM
About three years ago, NuScale Power, a developer of modular nuclear power units, decided to upgrade the wireless network at its headquarters in Portland, Ore. It chose Aruba, which is owned by Hewlett Packard Enterprise (HPE), as its network services provider and soon upgraded its five other locations.

Juniper Systems Releases Mesa 2 Tablet for Punishing Environments
January 19, 2016 - 1:17 PM
A mobile workforce is a wonderful thing; it can go just about anywhere and do just about anything. There's one point that often complicates things for the mobile workforce, however: life. From dropped devices to spilled drinks, life can be very rough on the hardware that a mobile workforce needs to operate. Juniper Systems may have an answer for that, however, in the Mesa 2 tablet, a rugged tablet with plenty of protective features.

Avaya's Top Tech Trends for 2016: Wearables, Virtual Reality, Data
January 19, 2016 - 10:04 AM
Avaya, a global provider of business communications software, managed to end 2015 with a bang, having been named 2015 Technology Partner of the Year by Axis Communications. And yet Avaya doesn't seem interested in lingering in its successes of the year past; rather, the company is looking ahead at 2016 with its recently released list of technology predictions for businesses and the channel for the coming year.

Key Channel Trends for 2016 - Are You Prepared for the Digital Transformation?
January 19, 2016 - 8:55 AM
As IT technologies continue to evolve to support the inevitable Digital Transformation, 2015 has been a year of significant change in the market, driven mainly by customers. Over the past year, the technologies that are fundamentally changing businesses - Cloud, Big Data and Mobility - have begun to mature. This trend will continue in earnest into 2016, and those companies that aren't able to provide or support these technologies will be in danger of being left behind. So what do channel partners and supporting vendors need to prioritise, pay attention to and nail down in 2016?

Five Steps to Securing Data Workflows in Your Organization
January 18, 2016 - 3:42 PM
OPSWAT CEO outlines ive steps to follow to implement a secure data workflow in your organization.

How Ranplan Plots Wi-Fi and Data Networks with an Application
January 18, 2016 - 8:57 AM
A technology plan that is accurate and well-executed has an almost magical element to it. Most everyone can appreciate accuracy, ease-of-use, and value. Ranplan is a company that aims to pair solid network planning with professional software. The company is delivering software tools that lead the industry in the task of planning indoor and outdoor wireless networks. Its software can also optimize and design these networks for any conditions and interior dimensions. It also uses advanced 3D modeling and simulates radio propagation.

Top 3 Service Trends to Watch in 2016: Clouds, Flexible Delivery, and Self-Healing
January 15, 2016 - 11:34 AM
Happy New Year! Welcome to 2016. Let's see what trends will most likely impact this year. Much has happened since we last offered prognostications for the year 2015. As always, we turn to our panel of experts, the Avaya Three, for our next

Wheelings & Dealings: Prevalent Gets New Round of Funding
January 15, 2016 - 10:25 AM
In an era where suffering a data breach is just as likely as not, consumers appreciate a company that can actually tell its clients they are safer than competitors. This is likely the premise behind the recent influx of cash for Prevalent, company that focuses on cyber threat intelligence. Prevalent announced earlier this week that it has just received more than $8 million in Series B financing from a number of investors.

The Reality of Shadow IT
January 15, 2016 - 8:18 AM
The world of enterprise information technology demands visibility and control over every element possible. In some cases, this is mandated by company policy, regulation, or compliance needs. In other cases, it makes business sense to control, measure, manage and maximize the resources being used within the company. Unfortunately, not every company can run a totally clean house; getting a hold on every single device and user in an environment can be very difficult. One of the biggest challenges to this is the phenomenon of Shadow IT.

Ovum: Telcos Are Investing Big in Revenue Management Systems
January 14, 2016 - 3:01 PM
In the past two decades, telephone companies have transformed themselves into communications service providers that deliver not just phone services, but also applications, data transport, infrastructure, video, and wireless services. Now these companies are going through yet another transformation - and this one is an even bigger challenge.

Cisco's New Weapon in the Fight Against Shadow IT
January 14, 2016 - 1:53 PM
Shadow IT is a phenomenon that's growing, and by some reports getting worse. Occurring when employees bring their own, unauthorized software into the workplace, it's a case of employees doing the right thing the wrong way and exposing the company to potential damage, intrusion, or even legal hassles. So Cisco brought out its new Cloud Consumption as a Service, a software-as-a-service (SaaS) product designed to spot and help prevent shadow IT operations.

LANDesk Improved Audit Accuracy with RevStream's Revenue Recognition
January 13, 2016 - 1:45 PM
RevStream this week announced that its automation software has been helping LANDesk, provider of user-centric IT solutions, obtain better, faster and more accurate revenue processes. In particular, LANDesk chose RevStream's software for integration with its existing SAP ERP implementation.

IT Security Professionals Fear Infected Devices Most of All
January 13, 2016 - 11:03 AM
When it comes to enterprise security, it seems as though there are new reasons to be paranoid every year. Government surveillance is a fairly new but rather real concern these days, for example, while call center fraud saw a huge surge in 2015. And yet, according to recent research from OPSWAT, provider of solutions to secure and manage IT infrastructure, it's connected devices that most IT security professionals fear.

The Year of Cybercrime Ahead
January 13, 2016 - 9:26 AM
2016 is a couple of weeks old at this point, and we haven't seen any truly major cybersecurity stories out there thus far. As we have witnessed in years past, that can all change in an instant and at a constant, frenetic pace. Whatever technology exploit or whatever scheme develops next, there is little doubt that cybercrime will be the field to watch. The enterprise has certainly got an eye at the spectrum of threats and it is endlessly putting up a battle to prevent another company seeing the kind of insider and outsider breach that has brought so many companies to the brink.

Telehouse Brings AT&T IP and Business Solutions to its New York Data Centers
January 12, 2016 - 2:50 PM
Telehouse has entered into a new agreement with AT&T that promises to help its customers simplify the way they do business through access to the network operator's high-speed network, mobility and cloud solutions. To do so, Telehouse will work through the AT&T Partner Exchange reseller program, allowing the company to offer AT&T's services to business customers via two mission-critical facilities in New York.

Physical Biometrics: Privacy and Security Concerns to Consider
January 12, 2016 - 1:41 PM
Cybersecurity trends have recently led organizations to consider the use of human biometric characteristics to supplement standard, but weak, single-factor authentication schemes that have historically relied on a password to validate rightful owners. However, the term "biometrics" has become an industry buzzword that encompasses a number of human second-factor solutions from "selfie"-based facial recognition to fingerprint and iris scans, behavioral patterns, voice - and even the human heartbeat.

DeepSpec Team Seeks to Make Software Development Truly Bug-Free
January 12, 2016 - 8:36 AM
Researchers from four elite academic institutions have joined forces in an effort to make the process of debugging software simpler and more effective. By using a more thorough specification process, the group claims it will be possible to build bug free applications, which would revolutionize software development and testing.

CoreSite Achieves 'Six 9' Availability for Five Years Running
January 11, 2016 - 9:04 AM
CoreSite, a provider of secure, reliable, high-performance cloud-enabled data center solutions across the U.S., just announced it has achieved the "Six 9s" or 99.9999 percent availability for the fifth consecutive year.

Steelwedge to Supply Radisys With its PlanStreaming Cloud Platform
January 8, 2016 - 11:47 AM
When businesses plan for the future, they understand the fundamental challenges of forecasting what is to come. Organizations that are able to recognize many different variables are far better equipped to handle the future. As a global communications and content provider that helps companies generate new streams of revenue and drive costs down, Radisys understands full well what it means to plan for the future, which is why it has selected the PlanStreaming cloud platform by Steelwedge.

T5's Newest Data Center Comes to Kings Mountains
January 8, 2016 - 10:04 AM
There's a race for data center space that has been going on for many years. Real estate that can support these kinds of data center projects are at a premium, and becoming a center for investment, building, and industry dynamics. T5 Data Centers has broken ground on a new build-to-suit data center at its campus based in Kings Mountain, North Carolina. Kristina Metzger is noted as the data center specialist who arrived at the ultimate selection of the site. She sought the facility as an employee of CBRE Data Center Solutions and on behalf of an unnamed Fortune 50 company.

Automating Storage Decisions to Enable Machine Learning with Smart Objectives
January 6, 2016 - 3:01 PM
As one year prepares to turn into another, it's a good time to take a step back and look at how the deck is stacking up for the future of technology. Times are really changing: we've got self-driving cars on the streets of Silicon Valley, and this year, new iPhones were purchased via telepresence.

Amdocs Climbing the Rungs of CSP Providers
January 6, 2016 - 8:53 AM
Communications service providers (CSPs) are operating in a dynamic environment in which new technologies are being introduced into the segment regularly. This is forcing service providers to function with increased efficiency in order to stay relevant in the highly competitive ecosystem. One of the companies delivering the tools for CSPs to be more efficient is Amdocs, a global provider of customer experience solutions.

Don't Fall into the Application Performance Gap
January 5, 2016 - 9:30 AM
A hybrid architecture forces IT to manage the expectations of highly mobile users who are scattered across multiple locations and all want to access apps and data that reside in the data center and in the cloud. Managing this complex environment is more difficult than ever, but that fact seems to be lost on the users.

Aero Stanrew Group Acquired by TT Electronics
January 4, 2016 - 4:34 PM
Just in time to be counted among the acquisitions of 2015, TT Electronics has announced that it has acquired Aero Stanrew Group Limited. Aero Stanrew Group Limited is headquartered in Barnstaple, Devon. TT Electronics is the name for a wide variety of business divisions. Focused on components and integrated manufacturing services, the company is entrenched in the transportation, medical, aerospace and defense, and industrial market sectors.

Dropbox-for-Business Support Now Available on STEALTHbits
January 4, 2016 - 4:32 PM
STEALTHbits made the announcement that it has launched support for the growing Dropbox-for-Business product. Dropbox is one of the leaders in the cloud storage space, with users that are consumer-level and a growing base of enterprise users. As STEALTHbits now provides its data access governance solutions suite on the Dropbox-for-Business platform, it will aid companies in complying with regulations and compliance requirements.

State of the Red Hat Union is Secure
January 4, 2016 - 4:25 PM
Technology innovation continues at a blurring pace, and this innovation has resulted in ubiquitous computing that spans practically every aspect of our lives. I've seen reports that anticipate 26 billion connected devices by 2020. These devices, combined with cloud-based services, present amazing opportunities for organizations around the world, and I'm proud of the role Red Hat is playing to help customers embrace this digital transformation the open source way.

BrightPoint's Sentinel Gives the Good Guys a Leg-Up in Cybersecurity
December 30, 2015 - 1:59 PM
Cyber attacks have become an ever-increasing threat this year. It seems almost every month we would hear of another enterprise being breached. In fact, the F.B.I. now ranks cybercrime as one of its top law enforcement activities, with President Obama's budget proposal for 2016 seeking $14 billion for cybersecurity efforts to better protect federal and private networks from hacking threats.

US-CERT Delivers Updated Cybersecurity Advice for Electronic Devices
December 28, 2015 - 8:15 AM
The United States Computer Emergency Readiness Team (US-CERT) was established in 2003 to protect the nation's Internet infrastructure. The organization is tasked with analyzing and reducing cyber threats, vulnerabilities, sharing cyber threat information, and coordinating the response to incidents on a national scale. From time to time, the organization gets information out that pertains to consumer-level devices, and that is the case with the latest update from the group.

A New Use for VPNs: Saving Money on Travel Costs
December 22, 2015 - 2:41 PM
If you haven't already started using a VPN, or Virtual Private Network, you are greatly risking the integrity of your private data and missing out on vital security measures that everyone should be taking advantage of.

Top Resolutions for IT Teams in 2016
December 22, 2015 - 1:22 PM
As 2015 draws to an end, IT teams look ahead to identify the issues that will prohibit them from innovating and keeping their organizations on the leading edge. In a recent report, which surveyed 2,685 IT professionals, it was found that the top challenges included security related to compliance and file transfer processes, ensuring continuous IT infrastructure and application performance and the ability to select, manage and deploy new technologies. Therefore, IT teams should expect the following resolutions to be at the top of their lists for 2016.

Kanguru Eliminates Password Woes
December 21, 2015 - 1:39 PM
Various studies of human traits show that people naturally have trouble remembering passwords. The task can be difficult, especially as password standards become more complex and are updated more frequently. The situation presents one of the biggest points of overhead for IT departments: password management. Further, some environments require security all the way around and that extends to data locations on your desktop, on mobile, and on USB drives. Kanguru has a solution for that problem on their secured and encrypted USB flash drives.

G Data Delivers Bad News about Malware in 2015 and Beyond
December 21, 2015 - 11:19 AM
G Data has long suggested that the bad guys are winning the war of Mobile Malware. Now the company has released its report for the third quarter of 2015 focusing on this issue. It shouldn't surprise anyone that the report does not paint a pretty picture. G Data has reported that of the more than two-thirds of the people worldwide who use Android's operating systems, more than 80 percent are using an outdated version of the OS. That puts users at a serious risk.

How Containers Make CIOs the Real Winner of the Cloud Wars
December 17, 2015 - 3:32 PM
It has become clear, even to the most causal enterprise IT observer, that the major cloud providers are in a relentless battle to win customers. These "cloud wars" are marked not only by increasingly similar feature sets across clouds, but also relentless price cutting. The leaders in these cloud wars-Amazon, Microsoft and Google-are determined to build their market share even if that means reduced margins in the short term. If they can capture a user today with lower prices, the story goes, they'll have a customer for life.

Radiant Logic Offers Secure Access across Multiple Applications
December 17, 2015 - 3:28 PM
Federated identity management (FIM) is a promising approach to securing resource sharing within an organization. FIM lets users keep the same identity across multiple applications, its purpose being improving the integrity of identity-driven transactions, increasing efficiency and lowering IT costs.

May the Cloud be With You: Top Tips to Build Cloud Security
December 17, 2015 - 1:49 PM
The cloud gives an enterprise power, flexibility, scale and control. It's an enormous computing power created by an interconnected, global information technology infrastructure. It surrounds businesses and individuals and empowers them. It binds the global economy together. Similarly, the Force gives a Jedi its power, making it possible to perform tremendous feats and amplify abilities. It is an energy field created by all living things. It surrounds us and binds the galaxy together.

Top Cloud Security Trends for 2016
December 17, 2015 - 1:36 PM
As IT organizations of all sizes begin to shift sensitive data and mission-critical business information away from more traditional data centers and into the cloud, 2016 is expected to be an important year for cloud service providers and users that are demanding new adaptations for cloud security. Many companies are discovering that traditional ways of managing IT security do not work as well for cloud-based solutions.

Not All Security Intelligence and Analytics Platforms are the Same
December 17, 2015 - 11:21 AM
Today's dynamic, data-driven businesses have never been more at risk for security breaches and potential for network performance impacts. With digital transformation in full swing, the pace of change is only accelerating, and an organization's ability to make the right decisions on solutions that provide a holistic, real-time view of the network is becoming more critical than ever.

Chinese Nationals Arrested for Attempting to Steal U.S. Military-Grade Semiconductors
December 11, 2015 - 2:24 PM
A counterfeiting and smuggling ring involving military-grade semiconductors has been broken up, with three Chinese nationals being held on federal criminal complaints.

Druva's Solution Handles Data Availability and Governance on a Single Platform
December 10, 2015 - 5:56 PM
Information protection and governance have traditionally been viewed as two separate processes and fall under completely different domains in many organizations. But as enterprises become increasingly distributed and mobile, handling data protection and availability alongside governance can be an efficient and cost effective approach.

Top 3 Considerations for 2016 IT Budgets
December 10, 2015 - 3:07 PM
As 2015 comes to a close and businesses look ahead to 2016, now is the time to create a plan in order to successfully navigate IT budgets. Businesses realize that allocating IT budget is core to a business, as the financial, image and monetary risks are significant enough to impact the success or failure of an entire company. Budgets are among the most scrutinized initiatives in business, representing a company's outlook and goals for an entire year ahead.

Artisan Infrastructure's Continuity Engine Now Supports VMware Server
December 10, 2015 - 1:03 PM
It's been well established that cloud infrastructure can help optimize business process, as well as people performance, but that doesn't mean cloud infrastructure specialists like Artisan Infrastructure are content to rest on their technological laurels. On the contrary, the race to improve cloud technology and infrastructure-whether through technology innovations, partnerships, integrations, or all of the above-is as fierce as ever.

The Threat is Real; Don't Be the Catalyst for Hacker Success
December 10, 2015 - 10:42 AM
The instant access we have to information, entertainment and individuals comes with a price - the networks we use are attractive to others and under attack. It makes sense; if we're using the same networks to transfer information that could potentially put millions in the hands of the individual with the best hacking skills, why wouldn't they try?

BrightPoint's Sentinel View Integrates with IBM Security Intelligence
December 10, 2015 - 10:35 AM
Hackers are great at collaborating to take down systems, but the defense industry hasn't been so quick to integrate. While the concept of full cooperation is still somewhat foreign to companies that provide security solutions, the latest collaboration between BrightPoint and IBM is a move in the right direction. Under this new arrangement, organizations will be able to carry out threat investigations and have increased visibility into evolving risks and threats in the digital ecosystem.

Infoblox Prevents Data Exfiltration in Real Time
December 10, 2015 - 10:27 AM
There are many reasons hackers break into the digital assets of an organization, and key amongst them is the theft of sensitive data and intellectual property. And one of the ways they access enterprise information is through the Domain Name System (DNS), because it is not scrutinized by regular security protocols such as firewalls, intrusion-detection systems (IDSs) and proxies. Infoblox has found a solution to that problem, and is introducing the first streaming DNS threat analytics tool that will prevent data exfiltration in real time.

Centrify Reveals the Strongest Ways to Combat Cyber Attacks
December 9, 2015 - 2:58 PM
One of the biggest issues with today's enterprise security solutions is that they are focused on protecting the perimeter. Unfortunately, that tactic is simply not enough in a technology landscape where cyber attackers are exploiting end users' identity vulnerabilities to infiltrate entire companies.

Akamai's New Report Shows an Internet Under Siege
December 8, 2015 - 2:03 PM
Akamai recently released its third quarter 2015 report on the state of the Internet security, and the news isn't good.

Towards a Frictionless IT (Whether You Like it or Not)
December 8, 2015 - 1:27 PM
With the term Frictionless IT, we mean an enterprise IT that just works, reshaped after the experience offered by modern consumer-grade public cloud services, which business users are growing to expect. If we don't start moving towards Frictionless IT, we all risk irrelevance.

Sennheiser to Bring Noise Cancellation Headsets to Privacy-Focused Verticals
December 8, 2015 - 11:56 AM
In sensitive, security-conscious markets like healthcare, government and finance, privacy and security or of top concern. However, ensuring privacy is about a lot more than simply keeping up with HIPAA regulations; it's about ensuring the technology you use is up to the task of keeping sensitive information private in all scenarios. This includes headsets, according to Sennheiser, a manufacturer of premium headset and audio solutions.

The 5 Surprising Truths About B2B Integration Challenges
December 7, 2015 - 2:39 PM
So you've been doing your research on enterprise integration, and you know it's in your company's best interests to comprehensively automate your processes. You may even know that it's necessary and only a matter of time before your competitors have left you in the dust without it. At this point, you're aware of the benefits of integration, but you're also becoming painfully aware of the challenges associated with it. You've heard horror stories, and you're stuck in limbo trying to figure out whether or not your company is ready to take the risk. If this sounds anything like you, then maybe the following five surprising truths about enterprise integration challenges will help clarify some things for you:

SSL Security Epic Fail: When Your SSL Decryption Solution Prevents Better Security
December 7, 2015 - 2:25 PM
SSL is everywhere. Today, many of the most popular websites leverage encryption to keep data secure and private. On top of that, other applications such as email, instant messaging, and FTP use SSL or its successor TLS to encrypt traffic. Need proof that SSL is ubiquitous? According to Sandvine, two thirds of Internet traffic will be encrypted by 2016.

Blue Coat and Dimension Data Team Up to Combat Evolving Cyberattacks
December 7, 2015 - 11:17 AM
Blue Coat recently announced that it will be combining efforts with Dimension Data to provide a web security solution as a global service by the first quarter of next year. It will combine the infrastructure of Blue Coat's Cloud Generation Gateway with security services provided by Dimension Data, giving customers an easy-to-deploy security product requiring no special on-premises equipment.

Planview Enterprise 11.5 Gives Insightful Views of Project and Resource Management Data
December 7, 2015 - 8:41 AM
Planview recently announced the latest release of its portfolio and resource management solution, Planview Enterprise 11.5 (PE 11.5). The update provides a business capabilities feature that determines whether or not technological assets have the ability to help a business meet its goals. It also features a new version of the company's ribbon user interface that provides a glance at areas needing attention and leverages Microsoft BI for visualization of portfolios.

Offshoring Versus Onshore Product Development
December 4, 2015 - 10:13 AM
Offshoring isn't new: From manufacturing, to customer service, to technical support, roles in a variety of functions are often sent to offshore locations. In the product world, this has also lead to the offshoring of product development activities to sites in Asia and Eastern Europe.

18 Ways to Help Your Business Limit Disaster Damage
December 4, 2015 - 8:30 AM
Have you read headlines like this lately? Realizing your business in the path of eminent danger is a very stressful situation. Helping IT leaders avoid and recover from outages is my passion. Given recent global weather events, I thought that this might be a particularly good time to focus on ways to avoid unnecessary costs of the next storm.

TeamQuest Acquisition of PureShare Brings IT Insight to Users
December 3, 2015 - 5:00 PM
TeamQuest announced recently that it had acquired PureShare with the objective of integrating both companies' products into a complete solution that provides IT departments an accurate, real-time view of operations. Each different type of company stakeholder will have a view of information consistent with the nature of the work they perform.

12 Cloud Questions for Every Company
December 3, 2015 - 3:32 PM
Driven by corporations interested in software flexibility and scalability, demand for cloud services continues to surge. But just how secure is the cloud? Analysts predict security products and cloud-based security services will be a nearly $9 billion market by 2019.

Ovum Expects the Cloud to Impact ECM Space in 2016
December 3, 2015 - 10:43 AM
With the new year nearly upon us, it's no surprise that companies have begun releasing predictions for the technology industry in 2016. For example, the latest Worldpay Global Payments Report expects the coming year to bring in "the third age of digital payments." Meanwhile, independent technology analyst firm Ovum says the enterprise content management (ECM) space has entered a new period of rapid evolution.

LinkedIn's New West Coast Data Center to Impact Speed, Data and the Environment
December 3, 2015 - 8:26 AM
LinkedIn has opened a West Coast data center to meet its growing storage and processing needs. This Hillsboro, Oregon data center makes up the trio of domestic data centers connecting the United States to the popular professional networking site. According to LinkedIn, these last 12 months have shown a 34 percent growth in user data and performance.

IHS Releases Rankings of Enterprise Networking Hardware Makers
December 2, 2015 - 3:51 PM
IHS has released its new Enterprise Networking Scorecard which ranks a number of enterprise networking and communication hardware makers.

Performing from Behind the Great Firewall of China
December 2, 2015 - 9:24 AM
The opportunity to do business in China presents a financial windfall for any company, just ask Apple, which last quarter reported profits were up 31 percent on strong iPhone sales in China. But there's an obstacle to doing business in China that every multi-national enterprise faces: the Great Firewall of China. The Chinese government has implemented a system that blocks websites and content it considers to be unfavorable leaving the company via the Internet.

3GC Group Adds Fortinet Camera, Recorder to CEPS Network App
December 1, 2015 - 2:53 PM
Networking consulting firm 3GC group recently announced that it has bundled its Converged Electronic Physical Security software with a Fortinet IP video surveillance camera and recording application.

Gemalto SafeNet Luna Payment Module Ups Mobile Credit Card Payments Secuirty
December 1, 2015 - 1:26 PM
Gemalto SafeNet Luna Payment Module provides highly secure tokenization to protect mobile credit card transactions.


Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter