Software


Cloud Security Services Help SMB Buyers Brook Budget Woes

SMB customers have a growing appetite for cloud-based security services. It isn't likely to be sated anytime soon. Thanks to a perfect storm of economic and technology trends, SMB consumption of cloud security services is expected to increase sharply over the next five years.

How VM Introspection Transforms Honeynets into Lean, Mean, APT-fighting Machines

In the right hands, a honeynet can be a powerful weapon in the war against advanced persistent threats. If you're contemplating adding advanced honeynets to your organization's arsenal, here are five things to consider.

How Remote Infrastructure Management Can Improve Processes and Increase Efficiency

These 6 action steps will help you get the most from outsourcing your remote infrastructure management.

Cloud Computing: Panacea or Power Monger?

Data centers growth has IT looking for alternatives. Is moving our processing and storage chores to the cloud a solution, or does it just shift the problem somewhere else?

Commentary: Survey of Agile in the Real World Confounds

A pair of analysts surveyed how enterprises are using an agile methodology. The facts are interesting; their analysis is downright foolish.

VDI Access Control in the Age of BYOD

VDI deployments offer benefits beyond simply managing the software installed base and lowering operations costs.

Careers: It's a Cruel Summer for IT Job Seekers

U.S. firms are in a holding pattern, at least when it comes to IT hiring -- a departure from the first three months of the year.



Assurance, AIC Launch Guardian Storage Server Line

Servers are based on AIC’s SB301-TO, next-generation Intel Xeon E5-2600 processor family.

Oracle Unveils StorageTek SL150 Modular Tape Library

New, scalable storage solution for midsize businesses.

New Technology Converts Desktop Web Sites to Mobile-Ready Sites

Womple, a Web-to-mobile conversion company, helps businesses take advantage of the rapid shift to mobile browsing, stay connected with customers.

Symantec Improves Enterprise Management of Android, iOS Devices

Company’s mobile portfolio updates security, management features for greater variety of hardware.

Microsoft Offers Sneak Peek at Updated Office 365

Cloud-based application supports features of Office 2013.

Accellion Solutions Secure Mobile File Sharing

FIPS 140-2 certified solution allows users to securely access and share enterprise content with Accellion Mobile Apps.

CopperEgg Offers Free Advanced Web site, Cloud Monitoring Service

RevealUptime delivers cloud analytics and correlation to maximize visibility, minimize false alarms.

Q&A: Akka 101

What makes Akka so valuable for building today’s distributed applications?

Q&A: Addressing BYOD with Identity-Based Security

Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.

Improve New App Implementation Using Your Old Environment

By proactively managing new technology implementations and fully understanding the old IT environment, your organization can meet end-user expectations faster while managing the overall impact to your network.

IAI: Big Data Analytics for Data Security

IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.

Yahoo Confirms E-Mail User Names, Passwords Exposed

Hack reveals lack of basic security standards.

Updated Moab Cloud Suite Helps Enterprises Maximize Cloud Benefits

Creating sophisticated policies, optimizing cloud performance now easier.