PoINT Storage Manager steigert Datensicherheit über automatisierte Replikation

Die PoINT Software & Systems GmbH hat in ihrem PoINT Storage Manager eine Replikationsfunktion integriert, mit der Daten auf Storage-Systeme im Capacity Tier und bzw. oder im Archive Tier repliziert werden können

Read More

Gigamon Visibility-Fabric-Apps und –Funktionen bieten die notwendige Big Data Traffic Intelligence für Unternehmen und Service Provider

Die neuen Applikationen ermöglichen intelligente Einblicke in große Datenmengen

Read More

ElectraLink selects HP

HP to transform data transfer network utilising managed cloud environment under six-year contract extension.

Read More

IBM reveals five innovations that will ‘change our lives’

IBM has unveiled the eighth annual "IBM 5 in 5" – a list of innovations that have the potential to change the way people work, live and interact during the next five years.

Read More

You can’t ignore BYOD and hope it will go away

Companies need to deal with the reality of BYOD, because it’s coming whether they like it or not.

Read More

Five enterprise IT predictions for 2014

Brought to you by David Gibson, VP at Varonis Systems - a provider of software solutions for unstructured, human-generated enterprise data.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
HP Networking provides consistent, pervasive wireless on-campus coverage for staff, students and...
Focus on Education campaign will drive business for resellers during peak buying season – new...
Dramatische Zunahme von hochvolumigen DDoS-Angriffen, APTs und Angriffen auf mobile Netzwerke
Die NSS Labs haben die Dell SonicWALL SuperMassive E10800 bereits das zweite Jahr in Folge mit...
Study from nine-months of penetration tests by Rapid7 analyses the most effective methods hackers...