by Paul Comfort | Nov 10, 2015 | Storage
I recently saw an assertion in a technical forum again that RAID is backup. I thought the subject had been thoroughly covered in the past, but it seems that it still needs some attention. RAID, except for RAID 0, provides redundancy which is different from backup....
by admin | Oct 19, 2015 | mobile threats, Security, Uncategorized
Scott Cunningham of the Interactive Advertising Bureau (otherwise known as the IAB, the largest collective of online advertisers responsible for ~85% of United States online ads,) made quite an interesting blog post a few days ago. In this post, he reveals some...
by Rob Oddo | Oct 15, 2015 | mobile threats, Networking, Security
While many security companies struggle to keep pace with the thousands (or even millions) of new vulnerabilities each year, Palo Alto Networks focuses on the techniques utilized with these exploits. With this approach, Palo Alto extends their advanced Zero-Day...
by Marketing | Oct 14, 2015 | Security
The primary operations of nearly all businesses rely on secure data storage and access. That is why it is essential to take the appropriate measures to protect your company data. If you do not, your company’s valuable data—an extremely important asset—could be at...
by admin | May 25, 2015 | Storage
Virtualization has become a mature platform with a mature ecosystem, and we now see it in every modern data center. With so many businesses heavily investing in hosting, developing and managing virtual workloads, there has also been an escalating difficulty in...
by admin | Mar 25, 2015 | Networking
Network and application visibility is turning the tables for IT administrators, because when they get a complete, instantaneous and comprehensive view into applications, connections, and users, they can much more rapidly identify problems and cut to the chase to solve...
by admin | Sep 30, 2014 | Storage
Your staff has practical questions about the data you store, and you can make it easy for them to find their own answers. Consider these scenarios: Q: What percentage of my data has not been accessed over the past year? The dormant data view within the DataGravity...
by admin | Sep 26, 2014 | Security
With the latest September 24th revelation of the bash bug coined “Shellshock” the question becomes: Have we turned a corner and open source software now becomes more expensive to maintain than proprietary products like Microsoft? The last two headline-inducing...
by admin | Sep 25, 2014 | Security
Is the bash bug, shellshock, worse than the heartbleed bug? There is some debate on the topic, however it is likely that the bash bug will be worse because the attack surface is so large and the exploit can lead to an infinite amount of secondary attacks. Additional...
by admin | Sep 15, 2014 | Security
As emerging and state-sponsored threats continue to escalate, security professionals report lower confidence in their ability, or specifically in their organization’s ability to properly detect and respond to threats. This article from Dark Reading by Ericka...