Data Security Resources

Data Security news and support resources, featuring the hottest solutions, technologies and vendors in the Data Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Data Security"

5 Steps Everyone Must Take When Building a Citrix Digital Workspace

Lakeside Software
0
Citrix Synergy 2018 is almost upon us and how to best create and manage a digital workspace is bound to inspire debate among IT pros. But the truth is, despite movement to the cloud and changing work styles and devices, the steps to digital workspace success remain constant. This post focuses on Citrix offerings, but […]

Microsoft Accelerate Your GDPR compliance with Microsoft Cloud

Microsoft
0
This post is provided by App Dev Managers Latha Natarajan and Sujith Nair who explore the critical aspect of protecting personal information and the impact of data security failures. This post also discusses the rich set Azure services that Microsoft customers and organizations can use to protect personal data in compliance with GDPR and other […]

Maslow’s Hierarchy Of Healthcare IT Infrastructure

The Maslow Hierarchy of Needs describes a series of universal needs as motivators for human behaviors. From a patient experience perspective that would include things like, easy access to healthcare services, and a focus on staying patient-centered. However, nowadays healthcare delivery-of-care is hugely dependant on digital systems such as Electronic Medical Records and Picture Archiving […]

Worldline Selects VMware Network Virtualization and Cloud Management Platforms to Accelerate Innovation and Time to Market

VMware
0
Shorter application development lifecycles reduce time to market for new services Cloud and network automation capabilities can free up IT resources, raise customer satisfaction levels and support Worldline’s ability to expand services to more countries VMware, Inc. (NYSE:VMW), a global leader in cloud infrastructure and business mobility, today announced that Worldline, a European leader in the payments […]

Thick and Thin Provisioning for VMware Disks: What is the Difference?

NAKIVO
0
In this article, we are going to consider the storage pre-allocation aspect of virtual disk settings in detail and find out what thick and thin provisioning are, how they differ, and which of these storage pre-allocation types is better for your infrastructure. Thick Provisioning Thick provisioning is a type of storage pre-allocation. With thick provisioning, […]

Citrix: Security for Your Application Delivery

Citrix Systems
0
Data security is foundational to any organization that wants to protect its intellectual property. To combat ever-evolving security threats, the enterprise must continually evolve the security paradigm based on new systems, architectures, and models. In traditional data centers, applications were hosted on-premises, where the security perimeter was well-defined and contained. The evolution of SaaS and […]

NAKIVO Helps a Hosting Provider Save €25,000 in Backup Cost

NAKIVO
0
Phi Medien Systeme GmbH, a hosting and cloud services provider, headquartered in Jülich, Germany, is using NAKIVO Backup & Replication to back up and near-instantly recover VMware VMs with Flash VM Boot, while also saving €25,000 in backup costs. NAKIVO Inc., a fast-growing software company for protecting virtualized and cloud environments, has announced today that […]

Former Citrix Executive Joins SoftNAS as Vice President of Marketing

SoftNAS
0
Cloud Data Platform Business Expands Team with Marketing Leader; SoftNAS moves headquarters to Park Laureate in Houston SoftNAS®, Inc., the #1 cloud data platform company and leading software-defined NAS provider for the cloud, today announced John-Marc Clark has joined its executive team as Vice President of Marketing. Clark brings three decades of enterprise software experience in global […]

AWS re:Invent 2017 Video: Deep Dive on Amazon S3 & Amazon Glacier Storage Management

Amazon Web Services
0
As your business grows, you gain more and more data. When managed appropriately, you can make this data a strategic asset to your organization. In this session, you’ll learn how to use storage management tools for end to end management of your storage, helping you organize, analyze, optimize and protect your data. You’ll see how […]

Gartner Forecasts Worldwide Security Spending Will Reach $96 Billion in 2018, Up 8 Percent from 2017

Gartner
0
Security Risks Drive Growth in Overall Security Spending Gartner, Inc. forecasts worldwide enterprise security spending to total $96.3 billion in 2018, an increase of 8 percent from 2017. Organizations are spending more on security as a result of regulations, shifting buyer mindset, awareness of emerging threats and the evolution to a digital business strategy. “Overall, […]

Patching Missteps Are Not an Excuse to Blame Victims of Ransomware Attacks

Dell
0
“It’s their own fault. They wouldn’t have been hit if they’d kept up with their patches and updates.” How many times did we hear this line in the wake of WannaCry, Petya and virtually every other cyber attack that has exploited known vulnerabilities in recent years? To hear the Monday-morning quarterbacks talk, you’d think data […]

VMware: ACI Specialty Benefits Supports its Growth With VMware Technologies

VMware
0
ACI Specialty Benefits (ACI) offers best-in-class benefit solutions to engage the new workforce and drive business performance. By offering services like employee assistance, corporate concierge, work-life balance, wellness, and student assistance programs to customers worldwide, ACI helps customers achieve Healthiest Workplace awards and Best Place to Work rankings, and improves company morale, productivity, and bottom […]

Got GPU Envy? Get the Advantage with DaaS!

Workspot
0
In every industry, whether healthcare, manufacturing, financial services and many others, we’re seeing accelerated adoption of cloud computing and Desktop-as a-Service (DaaS). Business decision makers are seeing less and less value in traditional IT skillsets that focus on keeping traditional IT machinery rolling. The reality is that with the rise of the public cloud, it […]

Building a better help desk: Part 2, secure permission management

ManageEngine
0
Welcome to the next installment of our Building a better help desk blog series. This time we will be discussing how to improve your permission management. Data security is of utmost importance in every organization. Since security breaches can have a crippling effect on the operation as well as credibility of organizations, enterprises need to pay great […]

Visit Our Sponsors

Close