Articles about Enterprise

Gcore launches DDoS protection for enterprise infrastructure

Organizations are increasingly faced with complex DDoS attacks that disrupt operations, increase latency, and compromise network security.

Security solutions company Gcore is launching 'Super Transit', which is not a big van but a cutting-edge DDoS protection and acceleration feature, designed to safeguard enterprise infrastructure while delivering lightning-fast connectivity.

Continue reading

The devices that are exposing enterprises to risk

The enterprise device landscape is becoming much more complex and more dangerous, with the average device risk per industry increasing by 15 percent year-on-year.

A new report from Forescout highlights that network-connected devices, from traditional IT operating systems to specialized healthcare systems and OT machinery, are exposing organizations to damaging threats such as ransomware attacks and data exfiltration.

Continue reading

HPE launches new virtual private cloud solution

Hewlett Packard Enterprise (HPE) is launching an expansion of its HPE Aruba Networking Central AI-powered network management solution, including a virtual private cloud environment.

This is aimed at customers who want the agility of cloud but with specific data security, data control or regulatory requirements, and an on-premises option that can operate while being disconnected from the cloud.

Continue reading

IBM brings new AI capabilities to the mainframe

IBM has announced what it's calling its most advanced mainframe to date, with major new AI capabilities.

Powered by a new IBM Telum II processor, the IBM z17 expands the system’s capabilities beyond transactional AI capabilities, enabling the platform to take on new workloads.

Continue reading

AI-driven video is ushering in a new era of collaboration

Online training

The shift to hybrid and remote jobs continues to redefine the modern workplace. For the past several years, video conferencing has made global collaboration possible, breaking down barriers that once made a fully remote workforce seem like a far reality. And while this technology will continue to be a core component of day-to-day business, it has only scratched the surface of how video can support increasingly dispersed teams.

In fact, it actually may no longer be enough to sustain remote environments. As workers and employers continue to clash around return to office (RTO) mandates and employee engagement reaches a record low, it’s clear that we need a new approach.

Continue reading

What NIS2 implementation means for enterprises [Q&A]

As cyberattacks across sectors continue to rise, businesses face pressure to enhance their security postures amid budget restraints and operational challenges.

In the EU, the new Network and Information Security Directive (NIS2) is making it mandatory for companies in Europe -- and those doing business with Europe -- to not only invest in cybersecurity, but to prioritize it regardless of budgets and team structures.

Continue reading

What businesses miss when protecting their data [Q&A]

No business is immune from the threat of cyberattack, but when it comes to protecting their most critical and sensitive data many feel they are inadvertently helping attackers through the leaking information.

We spoke to Paul Laudanski, director of security research at Onapsis, to learn about the most common errors and how to guard against them,

Continue reading

Developers get more confident in security but are still spending too much time on it

New research shows increasing confidence among developers at large organizations with regards to knowledge gained from security training, but they are still spending a considerable amount of time on security-related tasks.

The study from Checkmarx looks at the current practices of development teams in large enterprises as they work toward more mature states of development, security and operations (DevSecOps).

Continue reading

Three-quarters of companies now use open source observability tools

A new report from Grafana Labs looks at the maturity and evolution of the observability landscape, from the complex challenges teams are facing to the tools and tactics they're implementing to overcome them.

The study, based on 1,255 responses, shows 75 percent of respondents are now using open source licensing for observability into software performance, with 70 percent reporting that their organizations use both Prometheus and OpenTelemetry in some capacity. Half of all organizations have increased their investments in both technologies for the second year in a row.

Continue reading

Enterprise AI usage surges but security worries remain

A new report from Zscaler reveals a 3,000 percent year-on-year growth in enterprise use of AI/ML tools, highlighting the rapid adoption of AI technologies across industries to unlock new levels of productivity, efficiency, and innovation.

This surge in adoption also brings heightened security concerns though. According to the study enterprises blocked 59.9 percent of all AI/ML transactions, indicating awareness around the potential risks associated with AI/ML tools, including data leakage, unauthorized access, and compliance violations.

Continue reading

Ransomware readiness -- how boards can lead the charge against cyber threats [Q&A]

Ransomware attacks are increasingly targeting organizations across industries, with the potential to cause devastating financial, operational, and reputational damage.

We spoke to James Eason, practice lead for cyber risk and compliance at Integrity360, to get his insights into how executive boards can effectively prepare for such incidents.

Continue reading

Rooted mobile devices prove 250 times more vulnerable

Rooting (on Android) and jailbreaking (on iOS) were once widespread for enabling deeper customization and removing OS limitations on mobile devices. It's a practice that's become less common in recent years but still represents a serious security threat, not just to the user, but to enterprises who enable employees to access sensitive corporate apps and data from their devices.

Research from Zimperium's zLabs shows rooted Android devices experience 3.5 times more malware attacks, and system compromises have surged by 250 times compared to non-rooted devices.

Continue reading

New solution delivers fast recovery from ransomware attacks

With enterprises relying increasingly on data stored on the cloud existing ransomware solutions designed for in-house storage often fall short. That can mean longer recover times which in turn can prove devastating for the business.

Cloud backup platform Eon is launching a new cloud-native package designed specifically to provide protection and recovery from ransomware attacks. Engineered for immediate recovery, Eon's platform is able to restore clean data in minutes, offering greater efficiency than other current market offerings.

Continue reading

84 percent of enterprises are struggling to manage cloud spending

With cloud spending expected to increase by 28 percent in the coming year, a new poll of over 750 technical professionals and executive leaders worldwide finds that 84 percent see managing cloud spend as their top challenge.

The study from Flexera shows 33 percent of organizations are spending more than $12 million annually on the public cloud alone partly driven by AI adoption. With cloud budgets already exceeding limits by 17 percent, organizations are increasingly turning to managed service providers (60 percent) and expanding use of their FinOps teams to regain control over spending (59 percent).

Continue reading

Need to search terabytes of enterprise data? Tips for getting quickly to that 4-leaf clover

If you find yourself in a springtime clover field hunting for that rare 4-leaf clover, the journey is the reward. Not so if you and your team are hunched over your desks hunting 4-leaf clovers in terabytes of enterprise data. While combing through millions of files is never a “walk in the park,” enterprise search makes this process exponentially more pleasant.

To enable instant concurrent searching across terabytes, enterprise search first has to index the data. Indexing is simple: just tell the indexer the folders, emails archives and the like to index, and the software will take it from there. (This article uses dtSearch for its specifics on enterprise search but there are other comparable products on the market.) Tip: the files to index can be local or remote like SharePoint attachments, OneDrive / Office 365 files, etc. that appear as part of the Windows folder system.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.