Citrix is Helping the World’s Top Banks Achieve Secure Business Mobility
The Top 20 Global Financial Institutions have Implemented Citrix Solutions to Ensure App and Data Security Anytime, Anywhere Today’s financial services industry is more dynamic and competitive than...
View ArticleFast Growing Software-defined SoftNAS Attracts Technology, QA and Business...
SoftNAS, the #1 best-selling software-based NAS in the cloud, today announced three technology leaders have joined the company. Adam Marano serves as vice president, product management and advanced...
View ArticleCitrix: Rising to the Digital Business Challenge
The job of the CIO is more challenging—and more promising—than ever.The convergence of cloud, mobile, big data analytics and IoT has led to a dramatic increase in complexity, disrupted legacy IT...
View ArticleVMware: Zero to VDI In Just 7 Weeks with VMware Horizon & VCE VxRail
It is no secret that deploying virtual desktops and apps can be challenging. System architects often need to build in features like redundancy, fault tolerance and high availability to avoid system...
View ArticleMicrosoft: Always Encrypted now generally available in Azure SQL Database
Today we are announcing the general availability of Always Encrypted in Azure SQL Database. Always Encrypted is an industry-first solution offering unparalleled data security against breaches involving...
View ArticleCitrix NetScaler MPX 14000 FIPS Appliance: Ready for Action!
The Citrix NetScaler MPX 14000 FIPS appliance just launched last week, as part of the Citrix Security event in Washington, D.C.; what a great event and an great way to introduce the new platform! We...
View ArticleDoes Flash Storage Offer Data Security?
The economics of flash storage continues to improve, spurring more mainstream adoption. As prices drop and become affordable for more enterprises, flash technology meets two of the three objectives...
View ArticleMy cloud Learning Journey: Part 4 “Rocky Mountain High Security”
Chris Steffen is an Evangelist. He may be the world’s only agnostic evangelist. Based out of Denver, Colorado, he had not been with HPE too long when someone scanned his CV a second time and asked a...
View ArticleCloud Security Threats – Abuse and nefarious use of cloud services
This blog will look at the abuse and nefarious use of cloud services. This is one of the top threats identified by the Cloud Security Alliance in their recent white paper ‘The Treacherous Twelve –...
View ArticleWhat you Need to Know to Build a Reliable & Robust Enterprise Ecommerce Website
Given growth and industry consolidation of bigger market participants there is no margin for error in eCommerce applications, especially for smaller players. Customers expect responses within tens of...
View ArticleCisco: Protect the Branch with Stealthwatch Learning Network License
The threat environment faced by organization deploying branch networks continues to evolve. It’s time for a disruptive approach to handling network security across many distributed branch sites....
View ArticleAdvancing Healthcare Innovation Through High Performance Computing
We live in an incredible age for medical discovery and healthcare breakthroughs. With the advent of faster, low-cost genome sequencing technology, medical researchers can now understand the underlying...
View ArticleVMware: The Government Digital Workspace for Dummies: An Agency Roadmap to...
For very valid reasons, mobile devices and government agencies typically don’t play too well together. Maintaining data security and cyber hygiene across an agency’s desktop infrastructure is hard...
View ArticleFive key capabilities to optimize performance of your hybrid cloud services
Hybrid clouds unlock tremendous new potential for an enterprise. Being able to take advantage of the benefits from both private clouds and public clouds is the best of all worlds. Private clouds can...
View ArticleMicrosoft: Incremental backups on Microsoft Azure Backup – Save on long term...
Backup industry is migrating from tapes towards disks and cloud, making it more feasible to leverage technology to achieve efficient utilization of network, storage, and human resources. This results...
View ArticleHPE: ShareFile in a Hybrid Office 365 Environment
HPE’s Ciaran Rafferty, WW Mobility & Cloud File Management Architect, along with Michael Moore, WW Director, End User Workplace Services Portfolio, shared use cases on how to enable your enterprise...
View ArticlePCI Series: Requirement 1 – Install and Maintain a Firewall Configuration to...
This article is one of the blog posts dedicated to use of Identity Management (IdM) and related technologies to address the Payment Card Industry Data Security Standard (PCI DSS). This specific post is...
View ArticleVMware NSX Security: Features And Use Cases
Data centers are undergoing big changes in order to accommodate huge chunks of data in industries. As this data is very important, it is vital to provide good solutions to store it. Physical data...
View ArticleCitrix: Automated Security Scanners: What You Need to Know – Part 1
If you’re a Citrix customer and you want to keep your customer or employee personal information secure, chances are that you’ve had some exposure to one of the many automated vulnerability scanning...
View ArticleCitrix ShareFile – What’s New!
In 2016, we have delivered significant improvements to Citrix ShareFile. We have already had over 70 product releases across the ShareFile tools and the ShareFile platform.Below is a highlight of the...
View Article
More Pages to Explore .....