by Rob Oddo | Oct 15, 2015 | mobile threats, Networking, Security
While many security companies struggle to keep pace with the thousands (or even millions) of new vulnerabilities each year, Palo Alto Networks focuses on the techniques utilized with these exploits. With this approach, Palo Alto extends their advanced Zero-Day...
by Marketing | Oct 14, 2015 | Security
The primary operations of nearly all businesses rely on secure data storage and access. That is why it is essential to take the appropriate measures to protect your company data. If you do not, your company’s valuable data—an extremely important asset—could be at...
by admin | May 25, 2015 | Storage
Virtualization has become a mature platform with a mature ecosystem, and we now see it in every modern data center. With so many businesses heavily investing in hosting, developing and managing virtual workloads, there has also been an escalating difficulty in...
by admin | Mar 25, 2015 | Networking
Network and application visibility is turning the tables for IT administrators, because when they get a complete, instantaneous and comprehensive view into applications, connections, and users, they can much more rapidly identify problems and cut to the chase to solve...
by admin | Sep 30, 2014 | Storage
Your staff has practical questions about the data you store, and you can make it easy for them to find their own answers. Consider these scenarios: Q: What percentage of my data has not been accessed over the past year? The dormant data view within the DataGravity...
by admin | Sep 26, 2014 | Security
With the latest September 24th revelation of the bash bug coined “Shellshock” the question becomes: Have we turned a corner and open source software now becomes more expensive to maintain than proprietary products like Microsoft? The last two headline-inducing...
by admin | Sep 25, 2014 | Security
Is the bash bug, shellshock, worse than the heartbleed bug? There is some debate on the topic, however it is likely that the bash bug will be worse because the attack surface is so large and the exploit can lead to an infinite amount of secondary attacks. Additional...
by admin | Sep 15, 2014 | Security
As emerging and state-sponsored threats continue to escalate, security professionals report lower confidence in their ability, or specifically in their organization’s ability to properly detect and respond to threats. This article from Dark Reading by Ericka...
by admin | Sep 9, 2014 | Storage
The excitement at VMWorld about DataGravity (VMWorld 2014 Best New Technology and Best In Show) has not worn off for many, while others may not yet be aware of the product. DataGravity is revolutionizing storage and data management by combining primary storage, data...
by admin | Aug 22, 2014 | Infrastructure
An often asked question: Is DCIM overkill for data centers that have less than 1000 square feet white space or those with connected power less than 500 KW? This question comes up because of a commonly held myth that DCIM is only about power savings. The argument here...