News news and support resources, featuring the hottest solutions, technologies and vendors in the News world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home News

News

Cohesity DataProtect 5.0 Multi-Hypervisor Support: Microsoft Hyper-V

This is an exciting week for everyone at Cohesity, we have officially announced our Orion 5.0 release which is filled with new features, capabilities as well as expanded support for new hardware, applications and virtualization platforms including Microsoft’s Hyper-V. It is gratifying to know that our sophisticated and modern architecture and the capabilities of our […]

Pimoroni is 5 now! – Raspberry Pi

Raspberry Pi Foundation
0
Every couple of years, I’ve done a “State of the Fleet” update here on the Raspberry Pi blog to tell everyone how the Sheffield Pirates are doing. Half a decade has gone by in a blink, but reading back over the previous posts shows that a lot has happened in that time! TL;DR We’re an […]

Entisys360 CEO Mike Strohl Weighs in on Successful Partnership with IGEL for CRN

Entisys360
0
Our CEO, Mike Strohl, recently shared his insights on Entisys360’s successful partnership with IGEL Technology during an interview with CRN’s Steve Burke. He told CRN, “IGEL is now going after the software business first and offering hardware as an option. IGEL is bringing a high-level software management solution to the table with partners. That is […]

Citrix: Security Lessons from the Field

Citrix Systems
0
Security: it’s a topic that’s been in the news more than most IT professionals would care for. A string of highly public security breaches and technology hacks has many of our customers asking: How do I secure my Citrix environment and prevent a similar security incident? Many enterprises are now re-focusing on security as a […]

Cisco: Scaling Networks Automatically with ACI

Cisco
0
There are many things we think about when considering Software Defined Networking. Mostly, it’s the controllers, and the ability to apply configs and policies to our networks. In fact, we almost forget about the hardware, because as long as it’s setup properly, we don’t NEED to think about it. However, as any good network engineer […]

Citrix: Get a Competitive Edge with Digital Workspaces

Citrix Systems
0
A recent survey by Oxford Economics reveals a satisfyingly high return on investment for companies that fully embrace the digital workspace — virtualized desktops accessed through mobile devices carried by remote workers — which facilitates productivity, elevating both customer satisfaction and employee retention. If your organization isn’t optimizing its digital investments, it could be (or […]

Citrix: Securing Collaboration for G Suite Customers

Citrix Systems
0
Google and Citrix have announced a partnership to support customers with their secure cloud transformation, which spans multiple products and services from both companies. One key area of that partnership that I’d like to discuss in more detail is the G Suite integration. G Suite is a set of intelligent business apps that connect the people in […]

The Pros and Cons of Cloud Computing

Turbonomic
0
In a previous post, we tackled the pros and cons of virtualization, and wondered when it was good To V, or not to V. In this post, we’re going to pull back from on-site infrastructure and focus on the cloud. Cloud computing is as close to a true game-changer as the IT world has seen […]

Dell EMC Unity 4.2 Release

Dell
0
Dell EMC™ has just released a new Dell EMC Unity All-Flash portfolio: the 350F, 450F, 550F, and 650F. These new all-flash arrays are based on the latest Intel® Broadwell chip. Additionally, they are loaded up with twice the memory and up to 40 percent more processor cores than previous Dell EMC Unity models. What does […]

Virtualization-based security helps security pros relax

Bromium
0
Virtualization’s continued journey across the enterprise led inevitably to security Enhanced security benefits using virtualization are powerful and compelling Virtualization takes the security responsibility off users and delivers control to IT Detection-based security doesn’t work. It’s an exhausted concept. The battle’s been waged for 30 years and the cyber criminals won. Why? Because detection will […]

Enhancing Infrastructure Security Throughout the Entire IT Lifecycle

HP Enterprise
0
Emerging technologies help businesses capitalize on new opportunities but they also introduce IT risks. HPE ProLiant Gen10 takes away that risk by delivering the world’s most secure industry-standard servers. Just how much does cybercrime cost? According to the Ponemon Institute 2016 report, the cyberthreat environment continues to escalate with companies losing $9M, on average, each […]

Cisco: Replace your AV with Next Generation Endpoint Security

Cisco
0
If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus, endpoint detection and response, and even the much lauded machine learning. How do you cut through the clutter and noise to find what […]

Built-in protection against USB security attacks with USBGuard

Red Hat
0
Most people don’t consider their average USB memory stick to be a security threat. In fact, in a social engineering experiment conducted in 2016 at the University of Illinois and detailed in this research paper, a group of researchers dropped 297 USB sticks outside in the parking lot, in the hallway, and classrooms. Of the […]

Microsoft: Join our AMA: Ask Microsoft Anything about Windows Server security

Microsoft
0
On Tuesday, August 8, 2017 from 9:00 AM to 10:00 AM Pacific, we will host a one-hour AMA (Ask Microsoft Anything) session to answer your questions about the security features of Windows Server. In this free session, you’ll be able to ask Microsoft experts your questions about the new layers of protection built into the […]

Visit Our Sponsors

Close