CTR Exclusives

  • Five Steps to Protect Your Data
    by Roy Peretz Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and haven’t been willing to acknowledge it. Many are operating in specific regulatory environments, but aren’t in full compliance, leaving them vulnerable to lawsuits or even criminal prosecution. Data is data is data. It doesn’t m..... Read More >>
  • If Virtualization and Clustering Are Just Plumbing, How Do I Keep My Datacenter from Clogging Up?
    by Carl Berglund While virtualization and clustering technologies were developed to solve a range of datacenter challenges, the infrastructure they create is much like the plumbing inside the walls of a building. Done right, modern plumbing delivers hot and cold running water on demand. Similarly, when the datacenter is done right, critical business applications are always available. The pr..... Read More >>
  • The Race to Free Comes with a Price for Enterprises
    by Arthur G. Chang Traditionally, many businesses regarded “free” with a healthy amount of skepticism. But more recently, with the consumerization of IT proliferating amongst employees, many in the enterprise are grabbing onto the wave and turning to lower cost – if not free – options, especially for apps such as file sharing. The trouble is, many businesses become too focused on cu..... Read More >>
  • Enhancing Network Security with Physical Layer Management
    by Pat Thompson Infrastructure and network security systems are fine as far as they go, but they don't provide visibility into the state of the physical network. For complete security, network administrators need to know who is connecting to the network at any given time, where they are connecting, and how they are connecting. Physical layer management (PLM) systems enhance network security..... Read More >>
  • Going Beyond SDN and NFV for WAN
    by Steve Woo At the macro level, new innovations in wide area networking (WAN) are being triggered by at least four broad-based trends: 1. Migration of business-critical applications to the cloud (SaaS, PaaS, IaaS, etc.); Increase in the number and distribution of branch offices, the number of mobile workers, and the speed of deployment desired;
    Expectation by employees that they wi.....
  • Security Testing: When is it Necessary and What Methods Should Be Used?
    by Aleksey Abramovich When is security testing necessary? There are many instances where this is the case, but listed below are the basic ones. Security testing is necessary when: There is a corporate network or web application that was never checked for security issues (or was checked a REALLY long time ago).
    The system was successfully attacked or there was an attempt at attack.
  • Survey Says Providing High Availability and Disaster Protection for SQL Server Poses Challenges for Enterprise Data Centers
    by Jerry Melnick In many enterprise data centers, SQL Server is playing an increasingly important role in running core business operations, including customer service, order processing, payroll, accounting, and many more. For these organizations tolerance for SQL downtime and data loss is approaching zero. However, according to a recent survey by SIOS Technology Corp., providing the high a..... Read More >>

IBM, Microsoft set to give clients, developers superior choice as they move towards hybrid cloud

Wednesday, 22 October 2014 06:50


With adoption of hybrid cloud computing accelerating, cloud vendors IBM and Microsoft have entered on Wednesday into a pact to give developers, clients and partners greater choice in the cloud, helping...


VCE set to become part of EMC with continued backing from Cisco and VMware

Wednesday, 22 October 2014 05:25


EMC , Cisco and VCE announced Wednesday the vendors have jointly agreed to change the business structure of VCE from a joint venture to a more traditional one, and become an EMC business. VCE's agreem...


Amazon CloudFront becomes more informative and intuitive with trends, metrics, charts and timely logs

Tuesday, 21 October 2014 20:27

Amazon Web Services

Amazon Web Services announced Tuesday that its content delivery web service CloudFront will now provide timely logs and a new set of Cache Statistics reports. CloudFront integrates wit...


Meet Security Key, Google’s fast identity online universal second factor authentication

Tuesday, 21 October 2014 07:43


Google become the latest member to join the FIDO (Fast IDentity Online) Alliance , an industry conglomerate providing open standards for simpler, stronger authentication, to deploy support for FIDO...


I'll Pass on Passwords. I'm Sensing Biometrics.

Behind the BluStor PassWord Vault – your gatekeeper to the mobile world  

 by Kim Borg

It’s official: Passwords are passé. It should come as no surprise, really: Most of us are g...

Continuous Monitoring and Response Realities

by Kim Borg

Network security has come of age. To be sure, sophisticated security solution providers are squarely focused on helping companies deal with infrastructure complexity and IT consumeriza...
Sign Up for Breaking News and Top Stories in the CTR+ Newsletter (enter email below)