Sicurezza

Cisco broadens Tetration security delivery with cloud, virtual buying options

Pubblicato il

Cisco has added new cloud and virtual deployment options for customers looking to buy into its Tetration Analytics security system. Cisco’s Tetration system gathers information from hardware and software sensors and analyzes it using big-data analytics and machine learning to offer IT managers a deeper understanding of their data center resources. [ Don’t miss customer […]

Sicurezza

2018 state of resilience: The pressure is on

Pubblicato il

As we swerve onto the runway in 2018, IT leaders are finding themselves under increased pressure to ensure security, high availability and disaster recovery for the applications and systems under their care. The results of several surveys underscore the concerns of nearly 6,000 IT professionals around the globe. These surveys, conducted in 2017 by Vision […]

Sicurezza

Hot products at VMworld 2017

Pubblicato il

Product name: Liqid Grid and Liqid Command CenterManufacturer: LiqidPricing: UndisclosedAvailability: First quarter 2018Key features: Liqid’s hardware and software platform allows users, either manually or through policy-based automation, to manage and configure physical, bare-metal server systems in seconds. Liqid Command Center software delivers a unified API with software-defined intelligence and Liqid Grid (PCI-Express switches, bays, and […]

Sicurezza

Stop Thinking James Comey Keeps All His Files in a Cardboard Box

Pubblicato il

On October 19, 1973, Nick Akerman and his fellow Watergate investigators began hoarding whatever documents they could from the office of the special prosecutor, Archibald Cox. They knew that the next day, Cox planned to disobey President Richard Nixon and announce before a clutch of reporters at the National Press Club that he would pursue […]

Sicurezza

Security-as-a-service model gains traction

Pubblicato il

With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research. “The security challenge for mid-tier businesses is multi-dimensional,” Daniel Cummins, analyst at 451 Research, said in a statement. “For these businesses, everything seems to be […]

Sicurezza

IDG Contributor Network: Finding and protecting the crown jewels

Pubblicato il

Visibility and security controls for internet-based applications such as social media, file sharing and email have been widely adopted at the perimeter. As we transition from the legacy perimeter security model to a cloud security model, there is a need to ensure we don’t forget the principles we have established.  Virtualization has changed how applications […]

Sicurezza

Don’t get bit by zombie cloud data

Pubblicato il

The internet never forgets, which means data that should have been deleted doesn’t always stay deleted. Call it “zombie data,” and unless your organization has a complete understanding of how your cloud providers handle file deletion requests, it can come back to haunt you. Ever since the PC revolution, the concept of data deletion has […]