Cloud sandboxing for DevOps: What you need to know

DevOps

Sandboxes provide environments for developers and testers to reproduce even the most complex infrastructures, from data centers to public and hybrid clouds.

Sandboxes allow ITOps and dev/test teams to create personalized replicas of production environments with self-service, on-demand environments that can quickly allow even the most complex environments to be created, modeled, orchestrated and deployed -- from physical patch panels to distributed applications. This can rapidly speed up release cycles while drastically lowering cost and reducing risk.

Continue reading

New software suite helps business decision making

Sales graph

Businesses increasingly rely on analytics tools to make sense of their data. But often these can be complex and require several different programs to deliver results.

Analytics software company TARGIT is launching its new Decision Suite 2017 which offers a universal analytics solution with an enterprise-grade in-memory database and back-end tool set.

Continue reading

Healthcare staff lack basic cyber security awareness

PC health repair clean

The consequences of a security breach in the healthcare sector can be severe, yet a new survey reveals that healthcare staff are among the most likely to fall victim to social engineering attacks.

The study from SecurityScorecard exposes vulnerabilities across 700 healthcare organizations including medical treatment facilities, health insurance agencies and healthcare manufacturing companies.

Continue reading

What you need to know about disaster recovery as a service

Disaster recovery

Historically, disaster recovery was something that only really concerned big businesses. But as cloud adoption is continuing to grow amongst enterprises and small businesses alike and, as competition in the technology industry becomes ever-more intense, it has never been more important to be able to respond to network outages and unplanned downtime.

This is where disaster recovery as a service (DRaaS) comes in, providing a failsafe in the event of man-made or natural catastrophes through the replication and hosting of physical or virtual servers by a third-party.

Continue reading

What you need to know about OpenStack

OpenStack

Despite being launched more than five years ago and being supported by high-profile businesses of the likes of IBM, Intel, Yahoo, CERN, Disney, and hundreds of others, OpenStack is not particularly well known in business circles. This is largely because OpenStack is a cloud operating system that works behind the scenes delivering the infrastructure that organizations need to work effectively.

Speed and simplicity are its two main attributes, and since launching the OpenStack project has created thousands of jobs and benefitted countless organizations. With cloud computing continuing to grow in popularity all over the world, it’s vitally important that businesses have a strong understanding of what OpenStack can deliver.

Continue reading

Comodo offers companies free forensic analysis to fight zero-day malware

Hacking

Because it isn't detected by traditional, signature based anti-virus solutions, zero-day malware has the potential to wreak havoc in businesses of all sizes.

Cyber security company Comodo is launching a new, free forensic analysis service to help enterprises discover previously unknown and undetected malware that could cause serious security issues or data breaches.

Continue reading

New software simplifies BYOD management

BYOD key

The US mobile workforce is set to grow to 105.4 million workers by 2020 according to IDC and this creates a challenge for businesses trying to control and secure deployments.

In a bid to make things easier, networking solutions company Brocade is launching its latest Ruckus Cloudpath platform to enable IT organizations of any size to easily establish secure, policy-based access for wired and wireless devices.

Continue reading

Traditional retailers need to engage customers via mobile or lose them to online sellers

Mobile grocery shopping

As we approach the holiday season retailers will be looking forward to the annual boost in sales that it brings. But a new survey from Euclid Analytics reveals that if retailers don’t employ digital strategies to engage shoppers they risk losing them to online merchants like Amazon.

Mobile and social media adoption means a different shopping experience for consumers who are looking to make holiday purchases. They could be shopping at a physical store, while at the same time comparing prices and looking for coupons via Facebook on their smartphones.

Continue reading

Flash storage adoption is on the rise in UK

Storage Server Hot Swap Racks

A new survey carried out by data management company NetApp reveals the trends in flash storage adoption throughout various industries in the UK.

The legal industry is currently leading the way, with (50 percent) of respondents having already adopted it. This is followed by finance and manufacturing (both at 46 percent), education (42 percent) and IT and telecommunications (40 percent).

Continue reading

Google declares war on Microsoft Surface Hub with 'Jamboard' enterprise whiteboard

Jamboard01

Businesses can never go wrong choosing Microsoft. Between Windows, SharePoint, and Office, a company should see much success in both productivity and collaboration. One place where Microsoft was pretty much unchallenged in the enterprise was with Surface Hub -- its big-screen collaboration device running the wonderful Windows 10. Today, however, this changes, as Google unveils something of a Surface Hub competitor.

Called "Jamboard", the search-giant's digital whiteboard features a beautiful 55-inch 4K display, HD camera, and integrated speakers. Yeah, it seems very impressive. With that said, Google services like G Suite are unproven in the enterprise; an IT decision-maker would be taking a huge risk by spending company funds on Jamboard. After all, it costs $6,000.

Continue reading

The seven IoT devices that could be putting your business at risk

Risk dial

We've already seen concerns about the threats Internet of Things gadgets may pose in the home, with hackable Barbie dolls and snooping Smart TVs. Not to mention that the latest Dyn DDoS attack was carried out using unsecured IoT devices.

IoT devices are starting to become commonplace in businesses too so the potential for problems can only grow. Security company ForeScout, along with leading ethical hacker Samy Kamkar, has been investigating the risks these devices pose.

Continue reading

What you need to know about BYOD

BYOD bring your own device

With the rise of smartphone technology, BYOD -- or bring your own device -- certainly cannot be ignored by businesses. Whether they endorse the policy of using personal devices for workplace tasks or not, employees will use the best tools, or those they are most familiar with, to complete tasks, which frequently means using their own smartphone.

Of course, this extends far beyond simply taking work calls. Smartphones in the workplace are now being used to access corporate applications and perhaps more importantly, the data that they contain. Disregarding the mobility benefits of BYOD, this raises a number of security risks that businesses must consider.

Continue reading

IT executives are out of step with their teams

employee snoop

A new report finds that there's a disconnect between IT executives and their staff on critical issues, including control over SaaS applications.

The report from cloud specialist BetterCloud shows that non-executive IT staff, when compared to IT executives, are 29 percent more likely to say their team lacks complete control over their SaaS applications and 56 percent more likely to feel like their IT team lacks complete visibility into them.

Continue reading

New tool offers SWIFT network protection through deception

Shadows street

Attacks on the inter-bank SWIFT system have been making the headlines this year, proving lucrative for the hackers and worrying for the industry.

Help is on the way though as Cyber security company TrapX is launching a deception-based security solution, DeceptionGrid, specifically designed protect SWIFT.

Continue reading

Thycotic launches free tool to expose endpoint threats

Threat

We're seeing attacks on endpoint systems becoming more common and increasingly clever. Yet for administrators knowing what's happening on their endpoints presents a challenge.

Privileged account management specialist Thycotic is launching a new, free Endpoint Application Discovery Tool to automatically discover and reports on applications installed on Windows endpoints.

Continue reading

Load More Articles