CTR Exclusives

  • Five Ways Two-factor Authentication Easily Adds Security to Login Procedures
    11/25/2014
    by Dean Wiech Organizations large and small can easily add security to their login procedures with two-factor authentication, which is a simple process that requires users to enter more than one piece of information to access accounts. For example, in addition to simply entering a user name and password, two-factor authentication requires use of another identifier, such as a smart card or a..... Read More >>
  • Hackers Are Winning at Hide-and-Go-Seek
    11/19/2014
    by Steve Lowing
    Massive customer data breaches create urgency around managing endpoints and improving detection capabilities.
    As information and security technology professionals, we have an insider’s view when news about massive data breaches makes the front page. But think about it from the customer perspective. How many times in the last year have you had to change your credit car.....
    Read More >>
  • Five Tipping Points for Moving to a Next-Generation Manager of Managers (MoM)
    11/18/2014
    by Ken Fuhr Two decades ago, on the cusp of the Internet bubble, a technology dubbed “Manager of Managers”(MoM) burst on to the scene. These systems promised a “single pane of glass” that would aggregate streams of telemetry (events/alarms) emitted by myriad routers, servers, databases and applications across sprawling IT infrastructures by applying rules and filters to help determi..... Read More >>
  • Building Beyond the Buzz: Infrastructure Virtualization in the Cloud
    11/11/2014
    by Adam Leventhal Vendors attach descriptors like “virtualization”, “cloud” or “big data” to such a wide variety of products that the terms have been stretched too far to fit snugly on any comprehensible definition. Hype plays no small part. Who would want an iDisk when iCloud now stores your data in “the cloud”? The appeal of “software defined storage” is clear compared..... Read More >>
  • Generating Standardized Reports on Unstructured Data from Multiple Sources
    11/04/2014
    by Sergey Sinkevich Empowered by present-day technology, the pervasive necessity to enter new analytical dimensions dictates an urge for handling multi-source, multi-format data in a standardized and well-organized manner. End users want the ability to determine patterns and reveal tendencies in the avalanche of data right from their laptops or mobile devices. This holds particularly true f..... Read More >>
  • The Importance of Data Analytics in the Fight against Advanced Persistent Threats and Cybercrime
    10/23/2014
    by Jeff Frazier
    Home Depot’s recent announcement that a cyber-attack led to a data breach, compromising the credit card data of some 56 million customers, placed the home improvement retailer at the top of a list that no organization wants to be on, but which an ever-increasing number occupy: companies whose IT systems have been hacked, and whose customers and constituents have been vic.....
    Read More >>
  • Five Steps to Protect Your Data
    10/06/2014
    by Roy Peretz Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and haven’t been willing to acknowledge it. Many are operating in specific regulatory environments, but aren’t in full compliance, leaving them vulnerable to lawsuits or even criminal prosecution. Data is data is data. It doesn’t m..... Read More >>

Synology’s DiskStation DS215j delivers central platform to organize, backup, and share photos, music, video collections

Wednesday, 26 November 2014 06:51

Synology

Synology unveiled Tuesday a 2-bay NAS server intended for home and personal users to manage data, stream media contents, synchronize files on the cloud, while keeping their digital assets safe ...

More:

Barracuda ArchiveOne version 7.0 streamlines corporate-wide information management

Thursday, 27 November 2014 05:46

Barracuda  

Barracuda debuted this week ArchiveOne version 7.0 following its acquisition of C2C Systems (C2C) to builds on ArchiveOne’s proven functionality for easy-to-use, affordable, enterprise-c...

More:

AWS Data Pipeline offer templates, parameters from the command line

Thursday, 27 November 2014 07:04

Amazon Web Services  

Amazon Web Services updated Data Pipeline to make it easier to use by introducing support for parameterized templates, along with a library of templates for common use cases. Use...

More:

Consumers tend to be careless while carrying out online transactions, according to Kaspersky Lab survey

Thursday, 27 November 2014 01:50

Kaspersky

Data released from a consumer security risks survey conducted by Kaspersky Lab and B2B International found that nearly a third of participants are casual when making online transactions. This a...

More:

I'll Pass on Passwords. I'm Sensing Biometrics.

Behind the BluStor PassWord Vault – your gatekeeper to the mobile world  

 by Kim Borg

It’s official: Passwords are passé. It should come as no surprise, really: Most of us are g...
More:

Continuous Monitoring and Response Realities

by Kim Borg

Network security has come of age. To be sure, sophisticated security solution providers are squarely focused on helping companies deal with infrastructure complexity and IT consumeriza...
More: