Cloud-based routing system optimizes web app performance

Cloud maze complexity

How well an online application or website performs has a strong influence on whether users become and remain customers.

With the rise of SaaS and market demand for rich content delivery, even milliseconds of latency -- or, worse, downtime -- can dramatically impact user experiences and loyalty, brand reputation, conversions, and, ultimately, the bottom line.

Continue reading

Less than half of enterprises are aware of external sharing and DLP policy violations

data leak tap

Visibility and compliance challenges continue to haunt organizations, with only 44 percent of respondents claiming they have visibility into external sharing and DLP policy violations in their cloud application and environments.

The figure comes from a new report produced by cloud access security broker Bitglass which also finds that 85 percent of organizations acknowledge they are unable to identify anomalous behavior across cloud applications.

Continue reading

ZoneFox delivers improved intelligence and risk management to combat insider threats

insider threat

One of the biggest problems companies face in securing their networks is the number of alerts generated which is why many are turning to AI solutions to cope with the workload.

Scottish company ZoneFox is launching an updated version of its security platform that offers better risk management and enriched insights, further time savings and improved scalability.

Continue reading

Large organizations think SaaS is outpacing security

cloud padlock

A new report finds that 64 percent of IT decision makers believe the pace of software as a service (SaaS) application adoption is outpacing their cybersecurity capabilities.

The survey from cloud-based web security company iboss shows that 91 percent of IT decision makers agree they need to update security policies to operate in a cloud-first environment.

Continue reading

IBM launches cloud ready 'skinny' mainframe

IBM logo

Despite changes brought about by the cloud, edge computing and distributed systems, the mainframe remains for many businesses, the most stable, secure and mature environment to support IT initiatives including the proliferation of blockchains.

IBM is launching its newest cloud ready mainframe -- the IBM z14 Model ZR1 and IBM LinuxONE Rockhopper II, the latest additions to its family of z14 mainframe technology announced in 2017.

Continue reading

17 percent of employees fall for social engineering attacks

password theft

Employees are still falling for social engineering techniques leading them to download malicious files, click phishing links, correspond with hackers, and even share contact information for their colleagues.

Enterprise security specialist Positive Technologies imitated the actions of hackers by sending emails to employees with links to websites, password entry forms, and attachments.

Continue reading

Live migration and why it's important for VMware cloud partners

Data migration

When moving VMware virtual machines to the cloud, the sure-fire way to migrate the VMs and their data completely is to simply stop the VMs, copy their components (OVF files) and assemble them into an Open Virtual Appliance (OVA). You transport the OVA package over the network or via a physical device to the cloud destination, unpack the files and restart the VMs. If you’ve done things right, the VMs pick up right where they left off.

Of course, it's not quite that easy. The physical resources and configurations in the cloud data center should be comparable to what you were running on in your on-premises data center. Network addresses and access permissions have to be properly set up in the cloud environment as well. Fortunately, VMware provides useful tools like vRealize to address that part of the cloud migration challenge.

Continue reading

Cloud use and compliance drive enterprise encryption strategy

Data encryption

The need to protect sensitive data against cyber criminals, address complex compliance requirements, and guard against human error is driving enterprises to adopt encryption.

A new study by cyber security company Thales eSecurity, based on research by the Ponemon Institute, shows that 43 percent of respondents report that their organization has an encryption strategy applied consistently across their enterprise.

Continue reading

New program helps companies meet cloud security goals

Cloud data security

Infrastructure and development practices are changing as companies move towards cloud computing, DevOps, and on-demand SaaS delivery models.

This means security and operations teams must integrate their approach to securing systems. Cloud security company Threat Stack is launching a Cloud SecOps Program to help companies integrate security and operations initiatives and reduce risk.

Continue reading

New platform delivers improved data management across clouds

Cloud management

Businesses are increasingly using multiple cloud platforms and so need a means of managing all of their data assets wherever they're located.

Cloud development company JetStream Software is launching a new cross-cloud data management platform to give cloud service providers and enterprise cloud operations a better way to support workload migration, resource elasticity, and business continuity across multi-cloud and multi-data center set ups.

Continue reading

DevOps survey highlights complexity and culture worries

DevOps

Top barriers to DevOps adoption include stagnant organizational cultures and managing a jumble of legacy processes.

A new survey of DevOps and IT professionals from sandbox software company Quali finds 22 percent of respondents cite organizational culture, 21 percent legacy processes, and 20 percent growing software complexity as their top concerns.

Continue reading

Fewer than 15 percent of businesses are fully confident of recovering data in a disaster

server failure

In a new survey ahead of this Saturday's World Backup Day, data protection specialist Arcserve reveals that while downtime is a top concern, many businesses lack confidence in their ability to recover data.

In the study of 600 channel partners and IT decision makers across America, Europe and Japan, 57 percent of respondents say they aren't confident in their ability to recover their business data in the event of a downtime or disaster event. Only just over 14 percent say they feel very confident they could recover their data.

Continue reading

Druva unifies data management across clouds

Cloud

Enterprises increasingly store data in more diverse and complex cloud environments.

Data management platform Druva is launching a new version of its cloud platform offering an as-a-service solution that unifies data protection, management and intelligence capabilities for business-critical data.

Continue reading

More than half of organizations suffer mobile attacks

WiFi hotspot

Over half (57 percent) of organizations suspect their mobile workers have been hacked, or caused a mobile security issue, in the last 12 months according to a new study.

The study by mobile connectivity specialist iPass shows that public Wi-Fi is the most common source of incidents, with 81 percent of respondents saying they had seen Wi-Fi related security incidents in the last year.

Continue reading

New asset management platform lets businesses see and secure devices

network

One of the basic problems businesses face in preventing attacks is effective discovery and identification of their technology assets.

This is made worse by the growth of BYOD and Internet of Things devices. Israel-based Axonius is looking to solve this problem with the launch of its Cybersecurity Asset Management Platform to enable customers to see and secure all their devices.

Continue reading

Load More Articles