Welcome!


News Desk

Recent high profile security breaches at major online websites tell us static passwords are not the answer. Even recent SMS security additions to consumer websites do little to address the issue. Fortunately, a more secure authentication system is available for consumer websites that ...
This independent report from Info-Tech evaluates and scores 14 companies in the Virtual Machine Backup market. It can help you understand what's new in the virtual backup market, evaluate virtual backup vendors and products for your needs and determine which products are most appropria...
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, ...
up.time, from uptime software, monitors performance, availability and capacity across all servers, virtual machines, applications, IT services, and the network. Proactively find IT system performance issues before they happen, report on total capacity, easily identify troublemakers, tr...
Today's datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIOs conquering these types of challenges? Find...
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts ex...
Time compression, travel limits, and increasing complexity in every walk of professional life have driven web and video conferencing from new application to essential services – just like phone, FAX and email before it. This paper describes how OmniJoin™ cloud computing technology and ...
“We provide disaster recovery services as well as solutions. We also provide back-up solutions that work across your internal on-premise assets as well as in the public and private cloud," stated Joel Ferman, Vice President of Marketing at InMage Systems, in this SYS-CON.tv interview a...
“As the move to the cloud started, we stayed ahead of that by providing security solutions to our enterprise customers, financial customers, and now a whole new range of customers, which are application developers," explained John Gunn, VP of Corporate Communications for VASCO Data Sec...
VASCO Data Security International, Inc., announced it has sold its 200 millionth DIGIPASS authenticator. The milestone follows the company's recent announcement of record order intake in Q1 of 2014. "Global criminal hacking organizations pose a growing threat to our banking and enterp...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in – unannounced and unnoticed. By the time these thieves get in, t...
SOASTA on Tuesday announced complete native app support with mPulse, its award-winning Real User Monitoring (RUM) solution, which now delivers the first and only multi-dimensional views of actual user behavior whether on mobile web, web or native mobile applications. Using the same adv...
Following a successful launch in October 2013, the CloudCatalyst consortium is proud to announce the launch of its new website (www.cloudcatalyst.eu). The website has been completely revamped and now contains direct links to the events the consortium takes part in, major news and the d...
Electronic signatures are an important component of any web application. They make it possible to keep business processes online even when a signature is required on a contract, form or application. If you are interested in learning how to quickly integrate e-signatures into your cloud...
CA Technologies on Tuesday unveiled CA Cloud Service Management, a mobile-ready, SaaS-based IT Service Management (ITSM) solution that delivers simplicity and speed across the enterprise. CA Cloud Service Management is designed with a unique ‘configure, don’t code’ approach that offer...
The promise of easy, rapid, and low-cost deployment is luring increasing numbers to the cloud. Is security the only remaining obstacle to total domination by the cloud? In his session at 14th Cloud Expo, John Gunn, VP of Corporate Communications for VASCO Data Security, will examine ...
As businesses look to unlock greater value out of their existing IT investments, they are increasingly re-evaluating their overall desktop strategy. A greater mobile workforce shifting usage models like BYOD and legacy infrastructure refresh cycles are all acting as catalysts in fuelin...
In their session at 14th Cloud Expo, Jeff Tegethoff, CEO of Appcore, and Krishna Subramanian, VP of Product Marketing, Cloud Platforms at Citrix, will take a closer look at how Citrix CloudPlatform enables the transformation of IT by enabling them to manage both traditional enterprise ...
Has Washington finally caught on to the cloud? As a "borderless technology," cloud computing is subject to the laws and regulations of many different countries – some more than others. The American legal and regulatory system has recently been paying more attention to cloud computing, ...
SYS-CON Events announced today that VASCO Data Security International, Inc., a global leader in authentication, digital signatures, and identity management, has been named “Bronze Sponsor” of SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Ja...
Electronic signatures are an important component of any web application. They make it possible to keep business processes online even when a signature is required on a contract, form or application. If you are interested in learning how to quickly integrate e-signatures into your clou...
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. Enterprises must protect their data from (1) system administrators who don’t need to see the data in the clear and (2)...
CiRBA Inc. on Tuesday announced that three members of its management team will be speaking at four industry events over the next two weeks: Gartner Infrastructure and Operations Management Events in Berlin and Orlando, Cloud Expo in New York and the J.P. Morgan 4th Annual Cloud & Beyon...
Like electricity, compute resources can readily scale up and burst, and workloads can easily operate geographically. Storage however is more like water, where moving large amounts of data can be very challenging, especially over distance. In his session at 14th Cloud Expo, Joe Arnold...
IBM on Monday announced that businesses of all sizes – from start-ups to large enterprises - are rapidly adopting IBM Bluemix to develop software in the cloud with greater speed, security and quality. IBM also announced additional services on Bluemix, which will move from beta testin...
This report details findings from Forrester Research, Inc. about how the nine most significant solution providers for privileged identity management meet the 18-criteria evaluation and where they stand in relation to each other to help security and risk (S&R) professionals select the r...
The MAS guidelines for Internet Banking and Technology Risk Management (TRM), issued in June 2013, identify security and risk management issues in a comprehensive manner, covering everything from identity assurance and access controls to accountability and audit. This white paper detai...
Distrix, ein führender Entwickler von softwaredefinierten WAN-Produkten, die einfache, sichere und belastbare Netzwerke ermöglichen, gab heute die Änderung seines Namens von Spark Integration Technologies zu Distrix bekannt. Der neue Name spiegelt den Erfolg des Unternehmens beim Einsa...
SOASTA on Tuesday announced that it has entered into a technology and distribution partnership agreement with CA Technologies. The partnership will integrate SOASTA's Cloud based Web testing solution, CloudTest with CA Service Virtualization and CA LISA Test software suites. The soluti...
Reduce networking costs! Increase cyber security! Deploy applications faster! Add connectivity to our new office now! We’re under attack now – drop everything and jump on it now! How does IT management keep up with these demands? On top of that challenge, the promises of the Internet o...
InMage on Monday announced the release of Scout 7.1, enabling customers to leverage the public, hosted and private cloud as a target for backup and/or disaster recovery (DR). This next generation solution for hybrid cloud backup, recovery and migration is available in three form factor...
Companies are bracing for the challenge of upgrading hundreds or thousands of servers ahead of the "end of life" of Windows Server 2003 in July, 2015. Join this informative webinar to hear Microsoft's recommendations and see a demonstration of AppZero, the only automated way to "uplev...
For Windows environments, it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently to restrict administrators so they only access the servers and resources required to perform their job and only during the approved times to...
If you're not virtualizing, you're missing reduced equipment, management, and utilities costs, along with increased server utilization rates and the right path to cloud computing. But when you virtualize, backup becomes even more of an issue. Traditional agent-based backup and recovery...
Solidifying its position as a leading IT infrastructure and cloud provider, Peak 10 has been named the first provider in the Americas to achieve the Cisco Powered Disaster Recovery as a Service (DRaaS) designation under the Cisco® Cloud and Managed Services Advanced Certification. This...
SOASTA® Inc., on Tuesday announced that Huawei has selected SOASTA to provide continuous integration and robust functional test automation for its business and consumer offerings. Huawei will utilize SOASTA TouchTest and CloudTest for internal testing of Huawei’s apps, ensuring peak pe...
Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In its list of the eight most significant cybersecurity threats for 2013, Forbes c...
SYS-CON Events announced today that Silanis, the world’s leading electronic signature provider, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. Silanis is the world’s leading electron...
Learn how MedicAlert automated the functional, security, and performance testing for new APIs – enabling them to become an increasingly agile and valued provider of new healthcare information services. MedicAlert pioneered the use of medical ID products and delivers the most dependabl...
Many cloud hosting providers have achieved ticket-of-entry credibility in the data warehousing industry by building simple colocation centers. A first-tier database as a service (DBaaS) contender, however, is set apart by a value-added service approach that is strategic, consultative a...