Most data breaches caused by human and system errors

Symantec Corp. and the Ponemon Institute have released the 2013 Cost of Data Breach Study: Global Analysis which reveals human errors and system problems caused two-thirds of data breaches in 2012 and pushed the global average to $136 per record[1]. Issues included employee mishandling of confidential data, lack of system controls, and violations of industry and government regulations. Heavily regulated fields including healthcare, finance and pharmaceutical incurred breach costs 70 percent...

Read More

DDoS for the data centre

Juniper Networks has announced the availability of Junos® DDoS Secure to protect data centres against increasingly complex Distributed Denial of Service (DDoS) attacks. A key part of Juniper’s security portfolio, Junos DDoS Secure uses behavioral analytics and detailed network visibility to provide scalable protection against all major types of DDoS attacks.

Read More

Converged infrastructure choices from Dell

New solutions optimised for applications and workloads from branch office to scale-out data centre.

Read More


DataCore VDS 2.0 – The Virtual Desktop Server

DataCore Software has announced the release of DataCore™ VDS 2.0 software to make it simple and cost-effective to deploy persistent ‘stateful’ virtual desktops.

Read More

Super Micro Computer has introduced open private cloud solutions on Red Hat Enterprise Linux 8, the...
VAST’s Universal Storage All-Flash Architecture offers an 'unbeatable' combination of...
Tata Consultancy Services (TCS) is joining the Cohesity Data Security Alliance ecosystem. Cohesity...
New exascale computing hardware with best energy efficiency, for HPC, CDN, and general IT workloads.
Halves its storage requirement with Arcserve UDP Appliance.
QLogic FastLinQ Ethernet Technology to be adopted across GIGABYTE’s extensive server portfolio.
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more