Oracle VM

Data security & protection News

  • July 21, 2016 21 Jul'16

    Veeam Software still outpacing data protection market

    Veeam Software continued impressive growth last quarter, increasing bookings revenue 38% over last year in a market that is barely growing one percent. Veeam Software remains a private company, but ...

  • July 15, 2016 15 Jul'16

    IT wrestles with mobile privacy, security concerns

    You can't hang a "Do not disturb" sign on a mobile device. But users want their privacy when it comes to working on smartphones and tablets. IT must figure out how to balance their personal privacy with the ability to secure corporate apps and data on those devices. In this month's cover story, editor in chief Colin Steele dives into the issue of privacy in the mobile age.

    For the strongest mobile security, IT shops should take a layered approach, says columnist Eric Klein this month. Another column looks at why IT should make data storage and processing a priority in their mobility strategy. Plus, one of the newest ways to deliver and manage mobile resources is through workspaces -- an emerging technology that Jack Madden explains in depth. Finally, we recap the Best of Citrix Synergy Awards winners from this year's conference.

  • July 15, 2016 15 Jul'16

    Chief data officer job stakes claim in data innovation

    Forces at work in data management have led to the advent of the chief data officer. The role of the CDO and more is discussed in a Q&A with consultant Joe Caserta.

  • July 15, 2016 15 Jul'16

    FDIC found hiding multiple APT attacks and more from investigators

    An investigation by a federal committee found the FDIC had multiple breaches, including an APT attack, spanning years but hid the hacks from Congress.

View All News

Data security & protection Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data security & protection Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Data security & protection

Learn to apply best practices and optimize your operations.

  • Recovering from ransomware starts with data protection strategy

    While ransomware attacks may be nearly impossible to stop, there are important data protection measures your organization can take to recover effectively. Continue Reading

  • Internet of things challenges are many, but security tops the list

    Organizations that choose to tackle the long list of internet of things challenges know that security-related issues must be at the top of that list: A plunge into the world of smart, connected devices inevitably comes with a whole set of security concerns and requires knowledge of IoT security best practices. In this three-part technical guide, we survey how the rise of the internet of things affects enterprise security and the work of infosec pros.

    It opens with a technical tip focused on five steps infosec pros can take today to secure the interconnected devices traversing their enterprise network and carrying around corporate data.

    Next, one of our experts focuses in on the process of hardening individual devices to minimize the chance of compromise by bad actors. We close with a third tip filled with actionable advice on conducting proper IoT security testing.

    This three-part guide is filled with best practices for IoT security, looking at such things as raising awareness of potential security threats wrought by IoT and how to test your defenses in the IoT era. Readers will come away with a deeper, more detailed understanding of the nature of the internet of things challenges and a solid list of IoT security best practices.

     Continue Reading

  • Hyper-converged architectures receive value from deduplication process

    As capacity becomes cheaper, some storage administrators might assume deduplication is less relevant. But in hyper-converged data centers, the technology is as important as ever. Continue Reading

View All Manage

Problem Solve Data security & protection Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchDataCenter

SearchServerVirtualization

SearchCloudComputing

SearchEnterpriseDesktop

Close