Security news and support resources, featuring the hottest solutions, technologies and vendors in the Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Security

Security

Demand for Veeam Backup for Microsoft Office 365 Accelerates as Enterprises Move to the Cloud

Veeam
More than 25,000 organizations, representing 2.3 million Microsoft Office 365 mailboxes, have downloaded Veeam Backup for Microsoft Office 365 to protect their data Veeam reports 327 percent quarter–over–quarter revenue growth of Veeam Backup for Microsoft Office 365 Huge adoption on the heels of the most successful fiscal year for Veeam’s Cloud business, reporting 50 percent […]

VMware Named a Leader in 2018 Magic Quadrant for Hyperconverged Infrastructure

VMware
VMware, Inc. (NYSE:VMW) today announced that VMware has been positioned in the Leaders quadrant of Gartner, Inc.’s 2018 Magic Quadrant for Hyperconverged Infrastructure. (1) “In our view, Gartner has recognized the important role software plays in powering next-generation hyperconverged infrastructure in this report,” said Lee Caswell, vice president of product, Storage and Availability Business Unit, VMware. “We believe this Magic Quadrant for Hyperconverged […]

Worldline Selects VMware Network Virtualization and Cloud Management Platforms to Accelerate Innovation and Time to Market

VMware
Shorter application development lifecycles reduce time to market for new services Cloud and network automation capabilities can free up IT resources, raise customer satisfaction levels and support Worldline’s ability to expand services to more countries VMware, Inc. (NYSE:VMW), a global leader in cloud infrastructure and business mobility, today announced that Worldline, a European leader in the payments […]

Microsoft Announces Windows Defender ATP support for Windows 7 and Windows 8.1

Microsoft
With Windows 10 we built the most secure Windows ever, by hardening the platform itself and by developing Windows Defender Advanced Threat Protection (ATP) – a unified endpoint security platform that helps stop breaches. This means that for the first time we’ve built threat and exploit protection, and Endpoint Detection & Response right into the […]

World Backup Day 2018 data protection readiness reminder

Greg Schulz
World Backup Day 2018 Data Protection Readiness Reminder It’s that time of year again, World Backup Day 2018 Data Protection Readiness Reminder. In case you have forgotten, or were not aware, this coming Saturday March 31 is World Backup (and recovery day). The annual day is a to remember to make sure you are protecting […]

Cloud and Certification

Danny van Dam
The move to the cloud and cloud adoption will effect many working in IT, as an moderator on the TechNet forum for Education and Certification I see many questions on what certification to acquire to be ready for the demand on Cloud specialists.How should you invest your time and money to be ready for the […]

Top 10 Password Policies and Best Practices for System Administrators

Devolutions
We all know that a strong password policy is the front line of defense to protect our financial transactions, personal communications and private information stored online. For end-users, using a strong password at work is as important as it is at home, it is your own personal bodyguard defending you with everything he has against […]

Microsoft: Decentralized Digital Identities and Blockchain – The Future as We See It

Microsoft
Greetings everyone, I’m Ankur Patel from Microsoft’s Identity Division. It is an awesome privilege to have this opportunity to share some of our learnings and future directions based on our efforts to incubate Blockchain/distributed ledger based Decentralized Identities. What we see As many of you experience every day, the world is undergoing a global digital […]

Citrix: Meltdown and Spectre: Understanding the Performance Impact, Current State & What’s Next

Citrix Systems
Over the last couple of weeks, everyone in the IT industry has been keeping a close eye on a new class of security attacks that are taking advantage of a design flaw in modern computer processors. This is an industry-wide issue, not a problem specific to any operating system, hypervisor, or application. There are three […]

Cisco: What’s shaping cybersecurity in 2018?

Cisco
This year Cisco hosted the first CISO Experience at Cisco Live Barcelona, on 29 and 30 January. The event attracted over 60 Chief Information Security Officers (CISOs) and other senior security leaders, who discussed the topics that are shaping cybersecurity in 2018. In this first blog of the CISO Experience series, we covered their insights […]

Microsoft: Cloud App Security Threat Protection just got better

Microsoft
As we have conversations with Security Operations (SecOps) teams, we’re seeing a notable shift in the approach to threat detection and protection: moving from a technology-driven, product-focused approach to a use-case driven approach. These teams define their pain points carefully and invest in solutions that address these key needs. As we all know, the more […]

How to Secure Microsoft Edge browser downloads with Bromium Platform

Bromium
Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application isolation bandwagon. In December 2017, Bromium welcomed the arrival of the Windows Defender Application Guard (WDAG) for Microsoft Edge, […]

Citrix XenMobile + Microsoft Intune Integration Offers Security, Flexibility and a GREAT user experience

Citrix Systems
XenMobile offers transparent, highly secure micro-VPN connectivity behind the corporate firewall. Intune provides application layer data protection for Office 365 mobile apps without affecting end user experiences. Today, customers no longer have to choose between the two. XenMobile adds value for Office 365 XenMobile is the first unified endpoint management (UEM) solution to integrate with […]

February Poll: Does Your Organization Use (or Need) Password Management Software?

Devolutions
With data breaches on the rise, IT pros are waging a difficult and stressful battle — not just against hackers, but also against end users! That’s because, as we’ve highlighted previously, many end users continue to store passwords on spreadsheets, use the same password for multiple accounts, use alarmingly basic passwords, share passwords with colleagues, […]

Visit Our Sponsors

Close