Information Technology Editor's Pick

CHANNELS

Subscribe to the InfoTech eNewsletter

Editor's Pick

Cyber Threat Week in Review
April 17, 2015 - 1:32 PM
Next week is the annual RSA gathering of security professionals in San Francisco. This can only mean two things.

Is SSL Hurting More Than Helping Middle East Organizations?
April 16, 2015 - 7:33 AM
Regional security expert sheds light on SSL encryption that is being commonly used by organizations in the country

Eight Key Factors to Lead You to a Successful Hybrid IT Environment
April 14, 2015 - 1:04 PM
IT Transformation is far more than moving some workloads and apps to a public cloud provider. Transformation is about learning to manage technology and business relationships in new ways. No longer are you solely managing within the confines of your own data center. You now function with support from different sources and locations, provisioning without IT intervention, introducing new apps without solid business cases and line of business (LoB) users provisioning their own workloads.

The Hybrid IT Enterprise Demands an End to Network Guessing Games
April 14, 2015 - 6:00 AM
Although enterprises are increasingly adopting cloud computing and SaaS-based applications, the bell has not tolled for on-premises IT. As a result, enterprises are creating hybrid infrastructure stacks that present a new set of challenges for IT, including an increased risk of costly data breaches, and architectural "collisions" where design patterns for on-premises development and deployment don't translate well (or at all) into cloud.

How Safe are your Email and Attachments? Can They be Found but not Lost to Bad Guy Actions?
April 13, 2015 - 5:28 PM
There are two really interesting phenomena at work when it comes to enterprise data. I hesitate to call them trends since what they really happen to be are business imperatives. Unfortunately, many times that can seemly contradict each other.

Is 2015 the Year of a Data Dystopia?
April 13, 2015 - 10:42 AM
The recent news headlines about cyber attacks and data breaches can't help but feel a bit too dystopic for comfort. The start of the year has prompted the question: Could our data be headed toward a dystopian future?

IDT Corporation Uses Hexadite to Accelerate Incident Resolution and Improve Security Operations
April 13, 2015 - 10:34 AM
When it comes to incident response (IR), enterprises end up wasting 80 percent of their resources because it takes much longer than it should to address attackers in their networks. This is because they've been trying to utilize people in ways that systems can automate instead of having them focus on the tasks that truly require human intelligence and interaction.

New Supercomputer Will Cost Energy Department $200 Million
April 9, 2015 - 6:05 PM
Argonne National Laboratory is a science and engineering research laboratory located near Lemont, IL. By size and scope, it is the largest national laboratory in the Midwest, and the initial inception of Argonne was to carry out Enrico Fermi's work on nuclear reactors as part of the Manhattan Project.

A Small Startup's Secrets to Scoring Big Name Clients
April 9, 2015 - 11:58 AM
Just a few big name clients can make or break a startup in the enterprise space. Landing business from Fortune 500, or even 100, corporations gives young companies validation and legitimacy, not to mention revenue. However, it is extremely difficult to land these clients as a small startup. Large corporations with large budgets also come with large needs, which means their CIOs and IT buyers are understandably skeptical that startups are up to the task.

Seeing the Light: How File Analysis Tools Can Unleash the Light in Dark Data
April 9, 2015 - 11:28 AM
Dark data is a relatively new term to the industry, defined by Gartner "as the information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes (for example, analytics, business relationships and direct monetizing)." Almost all organizations have volumes of dark data stored away in dusty vaults and off-site storage facilities that is historically unaccounted for, unmanaged, and undervalued.

Want to Buy a Corporate Password? Ask a Current Employee
April 8, 2015 - 12:40 PM
Passwords these days are a tricky thing. Sometimes passwords just aren't strong enough, and it can be difficult to keep track of all the various passwords used and when these should be changed. But there aren't many out there who'd be willing to sell an email password to a potential bad actor, at least, until the issue of work passwords comes up. Then it becomes of a different animal, and one that may pose a big problem for companies.

Looking For Better Cybersecurity? HP Has Some Answers
April 8, 2015 - 12:21 PM
With the sheer number of high-profile data breaches taking place lately-some even called 2014 the year of the data breach-it's only natural that companies would be looking for ways to improve cybersecurity. While there are plenty of methods out there to bolster the security measures, HP has an idea that might sound a little novel, but has a surprisingly rational basis.

Manage What You Measure with IPDR
April 8, 2015 - 11:08 AM
Cable providers are facing challenging times - and there's no quick fix in sight. The surging popularity of over-the-top (OTT) content is one of the biggest sources of additional bandwidth, with Netflix now accounting for more than one third of all downstream Internet traffic during peak hours in North America. It's no wonder, then, that bottlenecks form during evening hours and deteriorate service quality.

Swiss Re to Work with HWind Scientific to Develop Parametric Insurance Policies
April 8, 2015 - 8:53 AM
According to the insurance industry website Artemis, Swiss Re recently announced that it would be working with HWind Scientific to create a new set of parametric insurance and reinsurance products based on analysis of data from U.S.-based hurricanes and tropical storms captured by HWind. The new products are designed to speed up the process of paying out claims.

How to Build a Sustainable Storage Infrastructure
April 7, 2015 - 3:53 PM
In our personal lives we tend to love "how to" guides. In fact, one of the big trends of the past few years has been the raging interest in do-it-yourself (DIY) capabilities ranging from cookbooks to building your own airplane. The same has been true in the business world where the "For Dummies Books" have been a staple for years. In fact, it is how I became Microsoft Office proficient.

Open Source or Open Core: Why Should You Care?
April 7, 2015 - 12:58 PM
It is no secret that open source communities and projects are a different breed of development. Different people drive them. Some have a benevolent dictator, and others are driven by like-minded individuals. What is common is that the participants have an itch to scratch. They were dissatisfied with the status quo, driven by a meritocracy, and wanted to shake the constraints of a slowly evolving proprietary software environment. Quality of code and contribution drove what ended up in a product release, and transparency in software development is now a default in many modern enterprises.

What You Need to Know When moving Apps to the Cloud and SLAs
April 6, 2015 - 10:23 AM
It's no secret that many businesses are already moving their productivity applications to the cloud, or they are considering it at least. In Microsoft's latest earnings release, for instance, the company reported a whopping 114 percent rise in business cloud revenues in the second quarter of its fiscal year alone. That growth is being driven by Office 365, Azure and Dynamic CRM Online adoption, and represents an annualized revenue run rate of $5.5 billion.

30 Percent of Potential Cybercrime Victims Plan to Negotiate
April 6, 2015 - 8:51 AM
It's one thing to stand up and make bold pronouncements about how there will be no negotiation with terrorists, in the grandest action movie tradition, but when it comes to cybercrime, the actual response could be much different. A new report from ThreatTrack Security suggests that almost one in every three security professionals would sooner negotiate with cybercriminals who hold data hostage, whether the data has simply been encrypted or has been outright stolen.

CompuCom Announces New Network, Cloud and Mobile Access Solutions
April 6, 2015 - 8:45 AM
CompuCom, already one of the leading technology infrastructure services companies in the world, has just announced brand new Network Access, Cloud Access and Mobile Access Solutions. These new solutions were primarily created in house by CompuCom but they were developed through the AT&T Partner Exchange program.

Blueprinting: The Administrator's Best Tool for Control, Compliance, and a Good Night's Sleep
April 6, 2015 - 8:03 AM
Cloud blueprints are often likened to architectural blueprints-both describe how a design is to be built reliably, consistently, and efficiently. Sounds like a winning idea for cloud administrators, who struggle (often unnoticed) every day with career make-or-break issues like IT management, governance and cost control.

Building the Right Cloud Can Be a Simple Process
April 2, 2015 - 3:56 PM
That's a huge variety of options right there, so it's not surprising to see that there would be hesitation on the part of businesses to bring this tool into operation. Surely most reasonable business owners would see that, with so many different choices available, the chances of getting one that's less than optimal is fairly strong. Thus it becomes extremely important to consider all the various aspects involved to reduce the chances of getting a system that doesn't fit the organization's needs.

Data-Centric Security: Keeping Email Secure and eDiscovery Easy
April 1, 2015 - 12:03 PM
Despite all the chatter (pardon the pun) regarding the importance of social media to enterprises these days, the way business gets done is and will remain rooted in email exchanges. In fact, as studies have indicated enterprises receive, create and store more and more email data each year as mission critical information increasingly is in electronic formats. In addition, while almost everything is not digitized, much of it never gets printed and put in a physical file, but rather is electronically stored so it can be easily accessed from a variety of needs including for legal and audit purposes.

Wheelings & Dealings: HGS Acquires Colibrium to Boost Healthcare Offerings
April 1, 2015 - 9:00 AM
Hinduja Global Solutions (HGS), an Indian provider of business process outsourcing (BPO) services, has acquired U.S.-based Colibrium Partners and Colibrium Direct (Colibrium), a provider of sales automation and customer relationship management (CRM) solutions for the health insurance industry. Under the terms of this agreement HGS now owns an 89.9 percent stake in Colibrium, while its founders will retain 10.1 percent.

State Farm Drone Aircraft Cleared for Flight
March 30, 2015 - 11:03 AM
Package delivery or military applications are the first things that come to a lot of minds these days when the topic of drone aircraft is brought up, but there are other applications for these tools that don't involve moving things from one place to another, be it books or bombs. State Farm recently received Federal Aviation Administration (FAA) clearance for one such use: camera-mounted unmanned aviation systems (UAS), otherwise known as drone aircraft, in assessing damage to property.

Automated DRM for Database Management and Business Continuity
March 27, 2015 - 10:27 AM
Having continuous access to corporate data is critical for any business, as even a short interruption can cause significant financial loss. There are plenty of threats businesses face when it comes to ensuring that systems and data can be recovered in the event of a disaster, natural or not.

Wheelings & Dealings: Apple Buys FoundationDB, Promptly Shutters It
March 27, 2015 - 6:00 AM
Apple has acquired FoundationDB, a company that makes back-end data processing for cloud services a lightning-fast affair. It also has appeared to have closed down the startup as soon as the sale went through.

Huawei, SAP Power Sinopec Financial Data Warehouse
March 26, 2015 - 6:03 PM
Energy and chemical giant Sinopec, which has the world's largest data warehouse, has tapped Huawei for the hardware and SAP for the data warehouse technology to power its financial reporting system.

Unsecured Email Is One of Our Largest National Security Threats
March 26, 2015 - 2:55 PM
While Hillary Clinton, Marco Rubio and Jeb Bush scramble to assure reporters that their use of personal email for government business was secure, the verdict isn't in yet on whether computer security experts agree. We do know the practice of using personal email for business - whether in the political or corporate world - is widespread. Unfortunately, using private or hosted email is almost exactly like sending one's private emails as postcards in the U.S. Mail: any attacker can easily get the email and read it.

Making the All-Flash Data Center a Reality, Part 2
March 24, 2015 - 7:47 AM
Part one of this article discussed the rise of flash storage due to its drop in price and superior performance. Part two describes how software-defined storage fits into the all-flash data center and synergies created by using these technologies together.

OPSWAT Tackles Email Malware with New Agent for Metascan Threat Prevention Solution
March 23, 2015 - 2:56 PM
The number of cloud-based services and applications being used by small businesses and enterprises alike has caused malware rates to skyrocket, with businesses scrambling to protect their sensitive data and their users. In fact, a recent survey from managed IT infrastructure provider OPSWAT shows that more than half of respondents had an email malware breach in the last 18 months.

Making the All-Flash Data Center a Reality, Part 1
March 23, 2015 - 8:11 AM
As the cost of flash storage continues to drop, the concept of the all-flash data center becomes more realistic. Many organizations are faced with storing not only their legacy data but the huge volumes of data being generated by the Internet of Things as well. Cisco states that almost half a billion mobile devices and connections were added in 2014, raising the total of global mobile devices and connections to 7.4 billion. The company predicts that global mobile data traffic alone will increase nearly tenfold between 2014 and 2019, reaching 24.3 exabytes per month by 2019.

Comings & Goings: Anurag Gupta Appointed Director Customer Service Operations for Xerox India
March 20, 2015 - 7:29 AM
Xerox announced recently that Anurag Gupta had been appointed Director Customer Service Operations for Xerox India (XI). Gupta, who has been with XI nearly 30 years, was previously the head of field service operations for the company.

Keeping Small Businesses' Networks Current and Secure
March 19, 2015 - 4:57 PM
The technology that enables our businesses evolves so often that it is seemingly obsolete just when you think you have it deployed and operating properly. But keeping your technology current and taking advantage of innovations and advances, especially as an SMB, is a "must have" to remain competitive in a digital age. With all this new technology promising immediate and dramatic results, one aspect that can easily be overlooked is keeping the core network current and secure.

Government Entities in Middle East Need Modern Security Solutions to Combat Modern Cyber Crime
March 18, 2015 - 10:02 AM
The Middle East has some very specific threats facing government entities. These come from regimes opposed to our politics as well as those wishing to benefit from industrial espionage. Meeting these concerns is a difficult task and one that requires a multilevel approach to security, which provides strength in depth. At the perimeter, securing services with DNS Firewall and 'Volumetric Attack Prevention' is critical; internal threats are more difficult to counter.

Penetration Testing: Is the End in Sight?
March 17, 2015 - 8:58 AM
With the attack surface, or perimeter, expanding exponentially, and attackers inside the network, the focus should now be on finding and stopping them-concentrating on how data leaves the system.

Effective Asset Management is the Key to Homeland Security
March 12, 2015 - 9:44 AM
Kevin Deal, Vice President Aerospace & Defense at IFS North America, looks at how new agile, cost-effective Software as a Service (SaaS) solutions are helping modernize service delivery for public services to get the most from their resources and save lives.

IT Needs Management Tools to Keep Up with Cyber-threats
March 9, 2015 - 5:32 PM
When it comes to the top cybersecurity technology concerns of IT managers, new research has revealed a need for management tools that streamline processes and save time, such as automation, to be better equipped to keep up with the evolving threat-scape.

DNS, DHCP and IP Address Management Grows into its Own
March 9, 2015 - 4:44 PM
The area of DNS, DHCP and IP address management (DDI) is seeing organic expansion, with initial small deployments becoming an enterprise-wide phenomenon.

GoDaddy is Just One of the Dominoes That Doesn't Have to Fall
March 9, 2015 - 2:45 PM
The GoDaddy customer breaches didn't have to happen and don't have to happen to you.

How to Manage Your Workloads in the Cloud
March 6, 2015 - 10:59 AM
The cloud is no longer a fad. According to the Cisco Global Cloud Index, 78 percent of all workloads will be processed in cloud-ready data centers by 2018.

The Top Cloud Technology Concerns Can Be Addressed Through Education
March 4, 2015 - 5:27 PM
It's well known that while organizations are aware of the cloud and its many benefits, they have concerns when it comes to actually adopting cloud-based solutions. Service providers are stepping up to the plate to head off those fears by better educating customers and prospects about cloud services and security, which has helped organizations of all sizes as they slowly migrate to the cloud.

The Expansion of Process into Workflow: What it Means for Your Business
March 3, 2015 - 4:06 PM
In today's global, mobile landscape business processes have become extensive and complex, reaching all kinds of mobile systems, data, content sources and devices. Businesses in this environment demand a coordinated way to connect all of these varied components and extend them to new places. As a result, what were once isolated business processes are now being united into workflow, a new category that is shaping the way businesses get everyday work done.

Improving Control of Virtual Machines
March 3, 2015 - 2:16 PM
Server virtualization is a darling of IT administrators for a number of reasons: it delivers more efficiency and cost control than adding physical servers to accommodate the data explosion. It offers savings due to server consolidation, at the same time giving enterprises valued flexibility and scalability, and promises to make the transformation to cloud architectures, whether private or hybrid, faster and simpler.

Allot Buys Cloud-Based Security Firm Optenet
February 26, 2015 - 5:07 PM
Allot Communications Ltd. this week announced it is buying security company Optenet for $5.5 million.

Putting 2014, 'The Year of the Breach' into Context
February 26, 2015 - 11:04 AM
With an average of more than two breaches occurring every day, the headlines begin to sound like an overwhelming, broken record. To take these huge numbers out of the abstract and give the breaches some context, they will be compared to human populations.

Ipanema Technologies Appoints Ben Heisler as Senior Vice-President of Sales in the Americas
February 25, 2015 - 12:58 PM
Ipanema Technologies announced it has appointed Ben Heisler as Senior Vice-President of sales in the Americas. An industry leader in network solutions, Ipanema provides enterprises with the solutions they need to guarantee business application performance, regardless of IT complexity.

Hyperconverged and Hyperscale: A New Day in Storage Dawns
February 25, 2015 - 9:57 AM
As data rapidly increases in today's information-based economy, storage demands are increasing right along with them. The cost of hardware alone makes it too expensive to build out traditional storage infrastructure, making its rate of scale too slow to be an effective option. Being able to expand rapidly is a key element of any organization's growth strategy. Enterprises today need flexible, scalable storage approaches if they hope to keep up with rising data demands.

Microsoft Moves Quickly to Remove Potentially Dangerous Adware From Lenovo Computers
February 24, 2015 - 12:31 PM
Malware and hackers have become such a problem for the computer business and computer owners that it almost seems like a new story pops up every day. While hackers and malware used to confine themselves to attempting to get into home computers or business hubs, networks have been the name of the game most recently. That doesn't mean these baddies are leaving home computers alone entirely. Most recently reports began surfacing that Lenovo had left its computers vulnerable thanks to preinstalling an adware program called Superfish Visual Discovery.

Wheelings & Dealings: NS-Technologies Acquired by Dialogic
February 23, 2015 - 4:43 PM
Without standardization, we end up with a combination of various and usually disparate networks. Dialogic, Inc. is one company whose goal is to boost the reliability of any-to-any network connections. Dialogic is able to efficiently connect these disparate networks through an assortment of networks and networking protocols that include IP, SIP and IMS.

When Gaming Isn't A Game: Three Best Practices to Protect Your Hosting Service Against DDoS Attacks
February 23, 2015 - 11:41 AM
The unprecedented number of security breaches, hacks and DDoS attacks on gaming communities, software manufacturers and even Hollywood studios grew to epic proportions in Q4 of 2014. Gaming sites and their hosting providers are particularly susceptible, and you don't have to be a giant in the industry to be affected. In this article, we will explore why gaming sites are so hard-hit and how hosting providers can most effectively defend themselves.

Equation Malware Unstoppable Until Hard Drive Is Destroyed
February 19, 2015 - 7:58 AM
While there are all kinds of different malware threats out there these days, one has risen above the rest to become the most feared. A cyberespionage group that has a skill set very similar to that of U.S. Intelligence agencies, has managed to get into key installations in both Russia and Iran using a form of malware that is so destructive and so dangerous that destroying the hard drive is the only way to stop its spread.

NetSwap Launches for Local Backup for Amazon S3, Google Cloud
February 18, 2015 - 5:24 PM
Storage specialist Highly Reliable Systems has released the NetSwap family of network-attached appliances, which provide reverse-cloud server backup for several bigwig data storage environments, like Amazon S3, Google Cloud Storage, DreamHost DreamCloud and Dropbox.

Rethinking Network Acceleration in a Third Platform World
February 18, 2015 - 8:12 AM
In order to enable a more robust network in today's fast-paced environments and stay ahead of the ever-expanding data growth curve, network management and security appliances will now, more than ever, need to remain in front of advancing network speeds to ensure apps run quickly, videos stream smoothly and end-user data is secure and accessible.

The Year of Threat Intelligence Sharing: Bringing Structure to the Chaos of Big Security Data
February 17, 2015 - 3:19 PM
?We've seen the security ecosystem evolve from all-in-one systems to point solutions to a bi-directionally integrated fabric knitting these silos together. This year that will extend into community-based, big security data digesting TIP systems.

Pulse Supply Delivers Solutions as Well as Product
February 17, 2015 - 12:41 PM
In businesses' hyper-connected world today, many are having trouble simply keeping up, yet alone getting ahead. Technology is moving so fast that some companies are getting left in the dust. That's where Pulse Supply steps in.

Docker Adoption is Ahead of Schedule
February 12, 2015 - 5:37 PM
As virtualization and container apps continue to catch fire in the enterprise, a new survey has revealed that Docker adoption in particular is ahead of schedule, just four months after exiting stealth mode.

Comings & Goings: WHOA Names New Chief Strategy Officer
February 11, 2015 - 7:43 AM
It is clear to see why WHOA is ecstatic about the hire; Varma's results speak for themselves. Over his eight years with Peer 1, he was integral in increasing the company's revenue from $35 million to nearly $200 million at the time of his departure.

ePlus Technology Receives Cisco Customer Satisfaction Award
February 10, 2015 - 6:11 PM
ePlus Inc. announced today that one of its subsidiaries has received a Cisco Customer Satisfaction Excellence Gold Star for its performance of customer service as a Cisco partner.

Technology Consolidation Bridges Application Delivery Gap
February 10, 2015 - 2:34 PM
I love bridges. I'm fascinated by the architecture that provides the foundation for a strong and stable layer below the roadway to safely and quickly deliver traffic. For centuries, these marvels have connected otherwise impassable and isolated areas to more populated road systems and communities.

Opengear Keeps Moving Forward with New Ideas
February 10, 2015 - 11:59 AM
To the ordinary lay person, a phrase like "out of band technology" might not be that easily decipherable. But to someone like Shirish Nilekar, Director of Product Strategy & Management at Opengear, the phrase means everything.

Firewall Monitoring Solutions Critical for Maintaining Security and Compliance
February 10, 2015 - 11:55 AM
2014 might very well go down in the history books as the year of security breaches. From Sony to iCloud to Target to eBay to Home Depot, malicious activity abounded and it seems no market sector was spared. If these attacks taught business owners anything at all, it's that the days of buying and installing a firewall and walking away are long gone.

How to Avoid These 5 Key Solution Outages
February 3, 2015 - 11:26 AM
The New Year brings new opportunities to look back, and-more importantly-look forward. In 2015, many IT managers will resolve to keep their systems up and running 24/7 without fail. And no wonder: An average service outage can result in $385,000 in related revenue loss.

The Cloud is Becoming Pervasive in Help Desk and ITSM Markets
February 3, 2015 - 11:08 AM
All areas of the IT world are being impacted by the cloud, but the benefits are especially pronounced when it comes to the help desk and IT service management (ITSM) market. The cloud is an ideal delivery mechanism for IT service and IT asset management (ITAM) solutions and early adopters are beginning to reap the benefits of the cloud and software-as-a-service (SaaS) models.

IBM and eBay Enterprise to Improve Magento's Global Presence
February 3, 2015 - 10:43 AM
Long before Carl Icahn pushed the hand of eBay CEO John Donahoe to split from PayPal, the company had acquired Magento in 2011. That acquisition is beginning to pay off as it gets integrated in to eBay Enterprise and become a growing piece of the company's ecommerce platform. In order to improve the Magento Hosting Partner ecosystem and increase its expansion globally, IBM and eBay announced an agreement to introduce Magento's ecommerce clients to IBM's enterprise cloud.

The Increasing Importance of DNS as an Attack Vector: How Middle East Businesses Can Keep it Secure
February 3, 2015 - 10:29 AM
The Domain Name System, or DNS, is a foundational Internet technology used in every non-trivial IP-based transaction and which, if it's not working properly, can bring the Web to a standstill. Since its invention over 30 years ago, DNS has been continually evolving to become the core component of the Internet today. Unfortunately, this has made it one of the most attractive targets for hackers and malware criminals.

FireEye Integrates Adallom into Threat Analytics Platform
February 2, 2015 - 2:34 PM
FireEye, Inc., a global cybersecurity solutions provider, recently announced an agreement with cloud access security broker Adallom to integrate the latter company's security visibility for cloud applications into FireEye's Threat Analytics Platform (TAP) suite.

Detection-Based Security Fails at Preventing Web Browser Malware According to Ponemon Institute
February 2, 2015 - 1:52 PM
Insecure browsers are set to allow Web-borne malware to infiltrate more than 75 percent of enterprises, according to some frightening new research from the Ponemon Institute. The firm queried 645 IT and IT security professionals for its new report, "The Challenge of Preventing Browser-Borne Malware," and the results point to some very serious gaps in data privacy and protection.

Calling All IT Directors: The Future Is Now, Argue ITEXPO Panelists
January 30, 2015 - 4:55 PM
When it comes to the disruptive changes that will rock the technology sector over the next three to five years, almost all ITEXPO panelists and keynoters this week agreed: we are entering a world dictated by the Internet of Things (IoT), big data and cloud computing.

The Cost of Monitoring (but Not Automating)
January 30, 2015 - 12:46 PM
Any IT professional who has used monitoring tools for any length of time is most likely perfectly comfortable setting up new devices, such as servers, routers, switches and the like. Adding sub-elements, such as disks and interfaces are probably a snap, too. There's also a good chance they've set up their fair share of reports and data exports. Not to mention alerts.

The Future of Storage in the Web-Scale World
January 29, 2015 - 2:55 PM
IDC predicts that 2015 will be a year of accelerating innovation on the Third Platform of computing-social, mobile, cloud and big data-that is rapidly transforming IT. The analyst firm is noticing early-stage enterprise investment in "Third Platform" workloads that leverage web-scale architectures typically seen in hyperscale environments. Enterprises in the Asia Pacific sphere (APAC), for example, are focusing IT spending on Web-scale cloud systems built by agile development teams to enable new business capabilities.

McAfee Exec: We Need to Do More to Secure Smartphones, IoT
January 29, 2015 - 12:26 PM
With all the high profile network breaches in recent months of everyone from CENTCOM to Sony and Target, we are all by now aware of the potential for hackers to gain unauthorized access to our networks and our data. Yet most of us don't bother to take the simple step of PIN protecting our smartphones.

VoIP Veterans at ITEXPO Discuss Net Neutrality, Title II Reclassification
January 28, 2015 - 5:22 PM
We've been discussing net neutrality for many years. Recently, the debate over this controversial topic has begun heating up again.

OnRamp Founder Will Explore IT's Future at ITEXPO Miami
January 28, 2015 - 4:19 PM
The future is bright for IT, with powerful innovations hitting the market every day to offer companies a slew of new hosted and hybrid options. But with so much activity and attractive new services, it can be hard to predict which technology choices made now will be the smartest ones in the long run. Companies aren't just ensuring their security today-they're building business security for the future as well. Staying informed is a huge factor in sticking to a profitable strategy.

5 Reasons Why Right Brain Thinking is Driving Cloud and IT Decisions
January 28, 2015 - 12:50 PM
Have IT managers lost their minds? Or are they only using half their brains? And if so, which side are they using now? Which side may they be using more in 2015 and beyond?

Radware Integrates Platforms with Cisco Application-Centric Infrastructure
January 27, 2015 - 6:05 PM
Radware is known for its network load balancing and security software. As such, it has vested interest in the advancement of network infrastructures which can bridge the gap between platforms. Cisco, with its Application-Centric Infrastructure (ACI), attempts to do just that by creating an object-oriented networking layer which will provide a central point for virtual and physical resource management.

Making 'The Year of the Retail Breach' a Thing of the Past
January 26, 2015 - 2:04 PM
The steadily increasing frequency of data breach occurrences in 2014 has been both astounding and worrisome. From Target and Neiman Marcus to Michaels, Chick-fil-A and Home Depot, fraudsters are leaving no stone unturned, and the millions of customers unlucky enough to use infected point of sale (POS) machines at these retailers now need to worry about whether their sensitive information has fallen into the wrong hands.

Stealth Mode: Lying in Wait inside the White House's Network
January 26, 2015 - 1:52 PM
Recent data breaches involved an unclassified computer network used by President Obama's senior staff, prompting countermeasures by the administration resulting in temporary system outages. Officials said the attack did not appear to be aimed at destruction of either data or hardware, or assuming control of other systems at the White House, which poses the question - what were the hackers looking for?

Software Analysis and Measurement is a Critical but Often Overlooked Component of Development
January 26, 2015 - 12:54 PM
The value and importance of big data analytics is becoming a game changer as organizations look for new ways to gain intelligence and actionable insight from the vast amounts of data they generate. But rarely is any sort of in-depth analysis of software conducted, which is interesting, considering this type of assessment offers valuable information about quality, risk, security and other important factors.

NetMotion Announces Self-Diagnosing VPN Software
January 22, 2015 - 5:34 PM
It is essential for enterprises to support their operations with networks that are consistent in their reliability and speed - wasted seconds due to downtime translates directly to a loss of revenue. A network that can diagnose its own problems may seem out of reach, but the latest announcement from NetMotion, a developer of mobility management software, says it has done just that.

The New IP: Building a Virtually Unstoppable Workspace
January 21, 2015 - 9:28 AM
Whether you run your own business, or simply work for one, chances are you will be very familiar with the advantages - and challenges - of flexible working. In the Middle East, we are beginning to see a trend of employees working part-time or in flexible full-time roles and in future this is only going to increase. Businesses are therefore increasingly under pressure to take action and make sure they have the technology and processes in place to meet these employee demands.

Keeping Up with the 24x7 Pace of Social Media for Business with Always-On Cloud Encryption
January 16, 2015 - 6:49 PM
Social media for business is a 24x7 flow of information and conversations. The world of social media today is well beyond its consumer beginnings, and is now heavily used by businesses. Most marketing departments will tell you they set aside resources, budget, and planning time to leverage this constant wave of information and influence.

Help! My Network is Congested
January 14, 2015 - 4:18 PM
You already know what's happening. With the explosion of broadband usage and online video, and especially streaming video from over-the-top (OTT) services like Netflix and YouTube, broadband service providers' networks are heavily tapped.

Meet the New InfiniBand - the Data Center's Best Friend
January 14, 2015 - 1:01 PM
NASA scientists created visco-elastic polyurethane foam to cushion astronauts' re-entry into Earth's atmosphere; when the patent was released to the public, it became Tempur-Pedic mattress foam. Teflon was first used in artillery shell fuses and in the production of nuclear material for the Manhattan Project before it became the standard for nonstick pans. The same principle of repurposing is emerging in the computing world as technologies from supercomputers find their way into data center architecture.

Top Security Risks in 2015 and How Middle East Organizations can Combat Them
January 14, 2015 - 9:12 AM
2014 brought with it slew of attacks of various types, 2015 could bring more sophisticated attacks with greater potential for causing harm. A10 Network's Glen Ogden outlines what to look for and how to provide proper protection.

New Year Resolutions for IT Security Professionals: The World Has Changed - Take Control
January 12, 2015 - 11:44 AM
We live in a different world than years ago. Most security professionals were content to have time to play with some logs, install a new Intrusion Prevention System, or get a sample of malware and try their hand at reversing. Generally though, most security professionals were relegated to a world of firewall administration, user authentication, and compliance (let alone the value-add security documentation that goes along with that…). As we've continued to see, times have changed and Chief Information Security Officers (CISO's) and their teams are expected to do considerably more now. The reality is that if you are CISO in today's world, you are on point to fight foreign military units and organized criminal enterprises.

Black Duck Software Makes Open Source Adoption Easier for the Enterprise
January 9, 2015 - 3:21 PM
Black Duck Software was recently named to the SD Times 100 for the seventh consecutive year. According to the press statement, Black Duck's OSS Logistics solutions help customers automate open source governance and compliance, continually monitoring for security vulnerabilities. The solution automates processes needed to manage the flow of open source throughout the enterprise, allowing companies to gain systematic control over how they acquire, approve, scan, monitor, secure, inventory, and deliver open source code.

Centerity Simplifies IT Network Monitoring
January 8, 2015 - 2:42 PM
With any kind of communication, IT network monitoring is essential to keep systems stable and going around the clock without interruption. IT managers and CIOs are under daily pressure to keep company business systems going. They have to maintain 24/7 IT services to drive growth, keep their customers satisfied or defend market share.

Datawatch Helps Harness Data Visually for a Clearer Picture
January 8, 2015 - 9:24 AM
When it comes to business, what can be measured gets done, and this is perhaps the key factor in why analyzing data leads to better performance by those organizations who religiously implement it. From healthcare to technology to retail, it is the data mined and analyzed that indicates the path of least resistance to success.

Gearing Up for ITEXPO with CGI's VP
January 8, 2015 - 6:00 AM
In true ITEXPO form, TMC has gathered industry thought leaders from around the globe to collaborate, share and learn about all the current trends as well as those expected down the road. Three weeks away from ITEXPO, CGI's VP of Global Communications Sector, Mobility & IoT Rene Sotola allowed TMC to pick his brain on Net Neutrality, mobility, WebRTC and much more.

Weaponizing Incident Response
January 6, 2015 - 10:57 AM
Cybersecurity solutions that reduce detection, response and recovery times are critical, but complex. That's because they require a variety of incident analysis and management tools that are automated, tightly integrated and, ideally, managed from a central command. Few companies have the time or expertise required to implement and run such a well-integrated, comprehensive cybersecurity program. Those companies that succeed find their implementation severely hindered by inadequate integration options and cross-platform incompatibilities.

Tech Trends 2015: Cloud-Based Communications and the Consumerization of IT
December 30, 2014 - 4:00 PM
Mobile computing, social media, and "the cloud" were once foreign concepts to most people. But today these technologies are fundamental to how we live, work, and play. So what's next? What new technologies will take the business world by storm in the coming year?

Are Firms Finally Moving Email to the Cloud?
December 30, 2014 - 10:39 AM
The reports of email's demise have been greatly exaggerated. For all the social media platform, unified communications offerings and other ways that people can communicate in 2015, email is still one of the most used and most basic.

MetricStream Makes 2015 Predictions
December 30, 2014 - 6:00 AM
As 2014 comes to an end, it is important that we reflect on trends and lessons learned in the past year, as well as anticipate what's ahead in 2015. There are several trends that captured our attention at MetricStream.

Cybersecurity Prevention Tips
December 29, 2014 - 1:06 PM
Looking back at the Sony Pictures Entertainment (SPE) attack, we must realize that now is the time, more than ever to take a more proactive approach to cybersecurity to prevent what happened to SPE from happening to your organization.

Xorcom: Productivity, Progress and Possibilities
December 29, 2014 - 12:37 PM
With the inevitable end of 2014 a few days away and ITEXPO just a few weeks away, Xorcom's CEO and Co-founder Eran Gal discussed apps, security, business communications an much more with TMC. Gal leaves little doubt as to why the Xorcom booth at ITEXPO will be a must stop at the upcoming industry event.

Greater Protection, Greater Revenue: Security as a Service for Hosting Providers
December 23, 2014 - 2:16 PM
According to the Identity Theft Resource Center, there had already been 744 data breaches and over 81 million recorders were exposed in the U.S. by Dec. of 2014, an increase of 24.8 percent over the same period last year. A 2013 survey conducted by the National Small Business Association found that 78 percent of organizations have experienced at least one data breach over the last two years. Not to mention the many high-profile security breaches that the big-name brands suffered in 2014, including Google.

Reflecting on 2014, Looking Ahead to 2015
December 23, 2014 - 11:58 AM
It is confirmed: 2014 has been a great year for Red Hat. Yesterday, we announced third quarter results of our fiscal year 2015 and, with that, celebrated our 51st consecutive quarter of revenue growth - more than 12 years of consecutive revenue growth. Thank you to the team of Red Hat customers, partners, open source contributors, and associates around the world, for helping us propel Red Hat to new heights. While 2014 has been a fantastic year for Red Hat, it has also been a banner year for open source.

Wheelings & Dealings: Carbonite to Acquire MailStore
December 22, 2014 - 3:14 PM
Data backup and recovery specialist Carbonite is beefing up its small and midsize business (SMB) proposition with the acquisition of MailStore, which is known for its email archiving capabilities, including full-text search and indexing capabilities.

EdgeWave Gains $2 Million from Additional Series A Funding
December 22, 2014 - 3:11 PM
EdgeWave, a San Diego-based cyber security firm, recently announced that it has closed $2 million in additional Series A equity funding. This round of financing, which was supplied by three investors, brings the company's total 2014 equity funding to $8 million.

Four Truths CIOs and CMOs Must Realize to Work in Harmony
December 22, 2014 - 6:00 AM
There is no doubt that marketing has risen in prominence. The rise of the internet has driven new behaviors in the customer base. In the B2B world, every buying center will research information online and it is the job of marketing to entice those buyers and bring them into their environment. Strategically, marketing are now the conduit for all business - yes, I did say "all" business. Tactically, this means driving inbound marketing programs, proactively working with sales on outbound initiatives and raising the brand of the company.

FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter