CTR Exclusives

  • If Virtualization and Clustering Are Just Plumbing, How Do I Keep My Datacenter from Clogging Up?
    09/30/2014
    by Carl Berglund While virtualization and clustering technologies were developed to solve a range of datacenter challenges, the infrastructure they create is much like the plumbing inside the walls of a building. Done right, modern plumbing delivers hot and cold running water on demand. Similarly, when the datacenter is done right, critical business applications are always available. The pr..... Read More >>
  • The Race to Free Comes with a Price for Enterprises
    09/23/2014
    by Arthur G. Chang Traditionally, many businesses regarded “free” with a healthy amount of skepticism. But more recently, with the consumerization of IT proliferating amongst employees, many in the enterprise are grabbing onto the wave and turning to lower cost – if not free – options, especially for apps such as file sharing. The trouble is, many businesses become too focused on cu..... Read More >>
  • Enhancing Network Security with Physical Layer Management
    09/16/2014
    by Pat Thompson Infrastructure and network security systems are fine as far as they go, but they don't provide visibility into the state of the physical network. For complete security, network administrators need to know who is connecting to the network at any given time, where they are connecting, and how they are connecting. Physical layer management (PLM) systems enhance network security..... Read More >>
  • Going Beyond SDN and NFV for WAN
    09/09/2014
    by Steve Woo At the macro level, new innovations in wide area networking (WAN) are being triggered by at least four broad-based trends: 1. Migration of business-critical applications to the cloud (SaaS, PaaS, IaaS, etc.); Increase in the number and distribution of branch offices, the number of mobile workers, and the speed of deployment desired;
    Expectation by employees that they wi.....
    Read More >>
  • Security Testing: When is it Necessary and What Methods Should Be Used?
    09/04/2014
    by Aleksey Abramovich When is security testing necessary? There are many instances where this is the case, but listed below are the basic ones. Security testing is necessary when: There is a corporate network or web application that was never checked for security issues (or was checked a REALLY long time ago).
    The system was successfully attacked or there was an attempt at attack.
    .....
    Read More >>
  • Survey Says Providing High Availability and Disaster Protection for SQL Server Poses Challenges for Enterprise Data Centers
    08/28/2014
    by Jerry Melnick In many enterprise data centers, SQL Server is playing an increasingly important role in running core business operations, including customer service, order processing, payroll, accounting, and many more. For these organizations tolerance for SQL downtime and data loss is approaching zero. However, according to a recent survey by SIOS Technology Corp., providing the high a..... Read More >>
  • Cyber Attacks: We're Fighting an Asymmetric War
    08/26/2014
    by Hitesh Sheth There’s a war on our high-value information. And we’re losing. The breach of Target Corporation shook the industry in January and Community Health Systems is the latest poster child of an industry that was ill-prepared and ill-equipped to deal with cybercrime, but a quick scan of the headline news begets a long list of other businesses and government agencies that have h..... Read More >>

ATP debuts SLC-based mSATA mini for embedded applications and ruggedized handhelds

Wednesday, 01 October 2014 03:04

ATP

ATP announced Wednesday mSATA mini, the latest addition to its NAND Flash product family. The mSATA mini follows the JEDEC specification of MO-300B with half the length of the mSATA modules, and is a...

More:

Red Hat debuts JBoss Developer subscription, resources and technology

Tuesday, 30 September 2014 04:09

Red Hat

Red Hat unveils new developer subscription program and resources for members of the JBoss Developer community, to help enterprise application developers work quickly and effectively.

More:

SanDisk unveils X300 SSD for corporate environments; new laptop upgrade services program

Tuesday, 30 September 2014 23:17

SanDisk

Flash storage vendor, SanDisk unveiled new client SSD which leverages latest improvements in X3 technology to deliver a better user experience with high-performance, while utilizing robust error-...

More:

Lantronix’s SLC 8400 console manager provides secure remote access to IT equipment

Wednesday, 01 October 2014 05:03

Lantronix

Smart Internet of Things solutions provider Lantronix launched on Wednesday its new SLC 8000 modular console manager. Designed to reduce deployment and management costs and time by offering secur...

More:

I'll Pass on Passwords. I'm Sensing Biometrics.

Behind the BluStor PassWord Vault – your gatekeeper to the mobile world  

 by Kim Borg

It’s official: Passwords are passé. It should come as no surprise, really: Most of us are g...
More:

Continuous Monitoring and Response Realities

by Kim Borg

Network security has come of age. To be sure, sophisticated security solution providers are squarely focused on helping companies deal with infrastructure complexity and IT consumeriza...
More:
Sign Up for Breaking News and Top Stories in the CTR+ Newsletter (enter email below)