CTR Exclusives

  • Verizon 2014 Data Breach Investigations Report: Change Auditing on Guard against Insider Misuse
    by Michael Fimin The Verizon Annual Data Breach Investigations Report is one of the most expected computer security reports of the year. Based on actual incidents of data breaches, the Verizon Data Breach Investigations Report shows the actual state of IT security by analyzing the trend in security incidents. One of its chapters, “Insider and Privilege Misuse,” is devoted to describing ..... Read More >>
  • Hyperconvergence 101: How to Tame Data Center Chaos
    by Scott Lowe There’s a new data center technology on the block and this time, it’s the real deal; it’s not a fad or a flash in the pan, but actually has the potential to reshape how many organizations deploy and manage their business-critical data center environments. Called hyperconverged infrastructure, this technology has actually been around for a couple of years, but gained new..... Read More >>
  • MBaaS Bolstering the Mobile App Industry
    by Vicky Harris
    What makes your smartphone so smart? Whether you’re an Apple fan or an Android user, it’s all about having more capabilities at your fingertips. And as the once-novel smartphone has quickly become a staple in our lives, a technology you may have never heard of has been behind the scenes making it all easier, facilitating the explosion in mobile capabilities: Mobile Back.....
  • Software-Defined Storage Boosted through PCI Express
    by Mani Subramaniyan The term software-defined storage (SDS) implies software managing the deployment and management of storage resources across a fabric, with on-demand, per-session or static configured allocations. But such deployments, available hardware and software infrastructure, and vendor offerings all differ widely in terms of management features and performance characteristics, ..... Read More >>
  • Five Ways Two-factor Authentication Easily Adds Security to Login Procedures
    by Dean Wiech Organizations large and small can easily add security to their login procedures with two-factor authentication, which is a simple process that requires users to enter more than one piece of information to access accounts. For example, in addition to simply entering a user name and password, two-factor authentication requires use of another identifier, such as a smart card or a..... Read More >>
  • Hackers Are Winning at Hide-and-Go-Seek
    by Steve Lowing
    Massive customer data breaches create urgency around managing endpoints and improving detection capabilities.
    As information and security technology professionals, we have an insider’s view when news about massive data breaches makes the front page. But think about it from the customer perspective. How many times in the last year have you had to change your credit car.....
  • Five Tipping Points for Moving to a Next-Generation Manager of Managers (MoM)
    by Ken Fuhr Two decades ago, on the cusp of the Internet bubble, a technology dubbed “Manager of Managers”(MoM) burst on to the scene. These systems promised a “single pane of glass” that would aggregate streams of telemetry (events/alarms) emitted by myriad routers, servers, databases and applications across sprawling IT infrastructures by applying rules and filters to help determi..... Read More >>
  • Building Beyond the Buzz: Infrastructure Virtualization in the Cloud
    by Adam Leventhal Vendors attach descriptors like “virtualization”, “cloud” or “big data” to such a wide variety of products that the terms have been stretched too far to fit snugly on any comprehensible definition. Hype plays no small part. Who would want an iDisk when iCloud now stores your data in “the cloud”? The appeal of “software defined storage” is clear compared..... Read More >>
  • Generating Standardized Reports on Unstructured Data from Multiple Sources
    by Sergey Sinkevich Empowered by present-day technology, the pervasive necessity to enter new analytical dimensions dictates an urge for handling multi-source, multi-format data in a standardized and well-organized manner. End users want the ability to determine patterns and reveal tendencies in the avalanche of data right from their laptops or mobile devices. This holds particularly true f..... Read More >>
  • The Importance of Data Analytics in the Fight against Advanced Persistent Threats and Cybercrime
    by Jeff Frazier
    Home Depot’s recent announcement that a cyber-attack led to a data breach, compromising the credit card data of some 56 million customers, placed the home improvement retailer at the top of a list that no organization wants to be on, but which an ever-increasing number occupy: companies whose IT systems have been hacked, and whose customers and constituents have been vic.....

IBM expands cloud centers footprint in Europe, Asia and the Americas to meet local mandates

Saturday, 20 December 2014 08:08


IBM Corp. unveiled this week plans to expand its global cloud computing network to 40 cloud centers with 12 new locations serving a growing roster of enterprise clients looking to move to hybr...


Carbonite buys MailStore to improve SMB Cloud lineup with email archiving offerings

Friday, 19 December 2014 04:16


Cloud and hybrid backup and recovery vendor, Carbonite and MailStore announced that the companies have entered into a definitive agreement whereby Carbonite will acquire MailStore.

This acqu...


MongoDB acquires WiredTiger in bid to extend growing database

Saturday, 20 December 2014 07:42


MongoDB acquired this week database storage engine vendor WiredTiger for an undisclosed amount in an attempt for the latter to contribute to the performance, scalability, and hardware effi...


StorageCraft unveils backup, disaster recovery tool for use with VMware, Microsoft System Center

Friday, 19 December 2014 03:32


StorageCraft Technology unveiled a new free tool to give users easy backup and disaster recovery of their virtualized environments.

The StorageCraft Plug-in for virtual environments is fr...


I'll Pass on Passwords. I'm Sensing Biometrics.

Behind the BluStor PassWord Vault – your gatekeeper to the mobile world  

 by Kim Borg

It’s official: Passwords are passé. It should come as no surprise, really: Most of us are g...

Continuous Monitoring and Response Realities

by Kim Borg

Network security has come of age. To be sure, sophisticated security solution providers are squarely focused on helping companies deal with infrastructure complexity and IT consumeriza...