CTR Exclusives

  • The Importance of Data Analytics in the Fight against Advanced Persistent Threats and Cybercrime
    by Jeff Frazier
    Home Depot’s recent announcement that a cyber-attack led to a data breach, compromising the credit card data of some 56 million customers, placed the home improvement retailer at the top of a list that no organization wants to be on, but which an ever-increasing number occupy: companies whose IT systems have been hacked, and whose customers and constituents have been vic.....
  • Five Steps to Protect Your Data
    by Roy Peretz Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and haven’t been willing to acknowledge it. Many are operating in specific regulatory environments, but aren’t in full compliance, leaving them vulnerable to lawsuits or even criminal prosecution. Data is data is data. It doesn’t m..... Read More >>
  • If Virtualization and Clustering Are Just Plumbing, How Do I Keep My Datacenter from Clogging Up?
    by Carl Berglund While virtualization and clustering technologies were developed to solve a range of datacenter challenges, the infrastructure they create is much like the plumbing inside the walls of a building. Done right, modern plumbing delivers hot and cold running water on demand. Similarly, when the datacenter is done right, critical business applications are always available. The pr..... Read More >>
  • The Race to Free Comes with a Price for Enterprises
    by Arthur G. Chang Traditionally, many businesses regarded “free” with a healthy amount of skepticism. But more recently, with the consumerization of IT proliferating amongst employees, many in the enterprise are grabbing onto the wave and turning to lower cost – if not free – options, especially for apps such as file sharing. The trouble is, many businesses become too focused on cu..... Read More >>
  • Enhancing Network Security with Physical Layer Management
    by Pat Thompson Infrastructure and network security systems are fine as far as they go, but they don't provide visibility into the state of the physical network. For complete security, network administrators need to know who is connecting to the network at any given time, where they are connecting, and how they are connecting. Physical layer management (PLM) systems enhance network security..... Read More >>
  • Going Beyond SDN and NFV for WAN
    by Steve Woo At the macro level, new innovations in wide area networking (WAN) are being triggered by at least four broad-based trends: 1. Migration of business-critical applications to the cloud (SaaS, PaaS, IaaS, etc.); Increase in the number and distribution of branch offices, the number of mobile workers, and the speed of deployment desired;
    Expectation by employees that they wi.....
  • Security Testing: When is it Necessary and What Methods Should Be Used?
    by Aleksey Abramovich When is security testing necessary? There are many instances where this is the case, but listed below are the basic ones. Security testing is necessary when: There is a corporate network or web application that was never checked for security issues (or was checked a REALLY long time ago).
    The system was successfully attacked or there was an attempt at attack.

NetApp overhauls hybrid cloud with new software, services and partnerships

Tuesday, 28 October 2014 06:57


At its Insight North America 2014 conference, NetApp unveiled new software, services, and partnerships that simplify data management across clouds.


Emulex is now part of 25Gb Ethernet Consortium to push for industry standardization

Tuesday, 28 October 2014 07:53


Emulex Corp. joined on Tuesday the 25Gb Ethernet (25GbE) Consortium to drive industry standardization, as the company prepares for 25GbE adoption in cloud, telecom companies, and enterprise environ...


Amazon Cognito now comes with OpenID Connect support

Monday, 27 October 2014 04:55

Amazon Web Services

Amazon Web Services added more flexible to its Amazon Cognito service by enabling app developers to use identities from any provider that supports OpenID Connect (OIDC). For example, u...


I'll Pass on Passwords. I'm Sensing Biometrics.

Behind the BluStor PassWord Vault – your gatekeeper to the mobile world  

 by Kim Borg

It’s official: Passwords are passé. It should come as no surprise, really: Most of us are g...

Continuous Monitoring and Response Realities

by Kim Borg

Network security has come of age. To be sure, sophisticated security solution providers are squarely focused on helping companies deal with infrastructure complexity and IT consumeriza...