Welcome!


News Desk

This one-hour webinar will cover the core benefits and features of up.time, including how up.time proactively monitors, alerts and reports on the performance, availability, and capacity of all physical servers, virtual machines, network devices, applications, and services. We’ll take y...
This Lab Validation report from Enterprise Strategy Group (ESG) provides you with best practices to create an environment that offers you simple unified data protection across physical and virtual landscapes, maximum protection and data availability, and reduced storage needs and opera...
IDenticard Access Control is a leading manufacturer of integrated access control solutions to protect employees, visitors, and facilities. Owned by Brady Corporation (NYSE:BRC), a $1.15 billion manufacturer of identification products, IDenticard Access Control draws on its 30 years of ...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensi...
Today's datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIOs conquering these types of challenges? Find...
SYS-CON Events, Inc. named Cisco "Gold Sponsor" of upcoming Cloud Expo, co-located with 3rd International Internet of @ThingsExpo, the largest IoT event in the world. 15th International Cloud Expo will take place November 4-6, 2014 at the Santa Clara Convention Center in Santa Clara, C...
This one-hour webinar will cover the core benefits and features of up.time, including how up.time proactively monitors, alerts and reports on the performance, availability, and capacity of all physical servers, virtual machines, network devices, applications, and services. We’ll take y...
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting eve...
Recent high profile security breaches at major online websites tell us static passwords are not the answer. Even recent SMS security additions to consumer websites do little to address the issue. Fortunately, a more secure authentication system is available for consumer websites that ...
IBM on Monday announced it has acquired the business operations of Lighthouse Security Group, LLC, a premier cloud computing security services provider. Lighthouse Security Group's Gateway platform protects identity and data in an increasingly complex IT environment where more company ...
Explosive technological advancement has created a molten landscape of disruption, reinvention and creation. New services arrive and become versatile building blocks for new ideas, products and businesses. As intuitive and intelligent technology relieves us of administrative burdens, we...
Evelyn de Souza is a cloud compliance and data privacy strategy leader at Cisco responsible for championing solutions to address emerging industry trends. She is a strong proponent of building repeatable processes that enable organizations to sustain compliance while optimizing data se...
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft, to discuss how developers are extremely well-poised to perform tasks critical for securin...
Lantronix, Inc. (NASDAQ: LTRX), a leading global provider of smart IoT (Internet of Things) solutions, announced the worldwide availability of its new PremierWave® SE1000 -- a high performance, programmable, Ethernet-based System-on-Module (SOM) that enables hardware and software engin...
Security is critical to Internet of Things (IoT) adoption because we want to make sure we can trust the sensors, actuators, rules engines and other connected componentry we embed in every element of our existence. Bringing this down to earth is as easy as pointing out that people's sma...
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, ...
This independent report from Info-Tech evaluates and scores 14 companies in the Virtual Machine Backup market. It can help you understand what's new in the virtual backup market, evaluate virtual backup vendors and products for your needs and determine which products are most appropria...
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts ex...
Vormetric on Tuesday announced that Rackspace Hosting has joined the Cloud Partner program, and will be offering encryption and key management services to customers via Vormetric's Transparent Encryption solution. Vormetric's Transparent Encryption combines the performance, flexibility...
up.time, from uptime software, monitors performance, availability and capacity across all servers, virtual machines, applications, IT services, and the network. Proactively find IT system performance issues before they happen, report on total capacity, easily identify troublemakers, tr...
Time compression, travel limits, and increasing complexity in every walk of professional life have driven web and video conferencing from new application to essential services – just like phone, FAX and email before it. This paper describes how OmniJoin™ cloud computing technology and ...
“We provide disaster recovery services as well as solutions. We also provide back-up solutions that work across your internal on-premise assets as well as in the public and private cloud," stated Joel Ferman, Vice President of Marketing at InMage Systems, in this SYS-CON.tv interview a...
“As the move to the cloud started, we stayed ahead of that by providing security solutions to our enterprise customers, financial customers, and now a whole new range of customers, which are application developers," explained John Gunn, VP of Corporate Communications for VASCO Data Sec...
VASCO Data Security International, Inc., announced it has sold its 200 millionth DIGIPASS authenticator. The milestone follows the company's recent announcement of record order intake in Q1 of 2014. "Global criminal hacking organizations pose a growing threat to our banking and enterp...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in – unannounced and unnoticed. By the time these thieves get in, t...
SOASTA on Tuesday announced complete native app support with mPulse, its award-winning Real User Monitoring (RUM) solution, which now delivers the first and only multi-dimensional views of actual user behavior whether on mobile web, web or native mobile applications. Using the same adv...
Following a successful launch in October 2013, the CloudCatalyst consortium is proud to announce the launch of its new website (www.cloudcatalyst.eu). The website has been completely revamped and now contains direct links to the events the consortium takes part in, major news and the d...
Electronic signatures are an important component of any web application. They make it possible to keep business processes online even when a signature is required on a contract, form or application. If you are interested in learning how to quickly integrate e-signatures into your cloud...
CA Technologies on Tuesday unveiled CA Cloud Service Management, a mobile-ready, SaaS-based IT Service Management (ITSM) solution that delivers simplicity and speed across the enterprise. CA Cloud Service Management is designed with a unique ‘configure, don’t code’ approach that offer...
The promise of easy, rapid, and low-cost deployment is luring increasing numbers to the cloud. Is security the only remaining obstacle to total domination by the cloud? In his session at 14th Cloud Expo, John Gunn, VP of Corporate Communications for VASCO Data Security, will examine ...
As businesses look to unlock greater value out of their existing IT investments, they are increasingly re-evaluating their overall desktop strategy. A greater mobile workforce shifting usage models like BYOD and legacy infrastructure refresh cycles are all acting as catalysts in fuelin...
In their session at 14th Cloud Expo, Jeff Tegethoff, CEO of Appcore, and Krishna Subramanian, VP of Product Marketing, Cloud Platforms at Citrix, will take a closer look at how Citrix CloudPlatform enables the transformation of IT by enabling them to manage both traditional enterprise ...
Has Washington finally caught on to the cloud? As a "borderless technology," cloud computing is subject to the laws and regulations of many different countries – some more than others. The American legal and regulatory system has recently been paying more attention to cloud computing, ...
SYS-CON Events announced today that VASCO Data Security International, Inc., a global leader in authentication, digital signatures, and identity management, has been named “Bronze Sponsor” of SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Ja...
Electronic signatures are an important component of any web application. They make it possible to keep business processes online even when a signature is required on a contract, form or application. If you are interested in learning how to quickly integrate e-signatures into your clou...
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. Enterprises must protect their data from (1) system administrators who don’t need to see the data in the clear and (2)...
CiRBA Inc. on Tuesday announced that three members of its management team will be speaking at four industry events over the next two weeks: Gartner Infrastructure and Operations Management Events in Berlin and Orlando, Cloud Expo in New York and the J.P. Morgan 4th Annual Cloud & Beyon...
Like electricity, compute resources can readily scale up and burst, and workloads can easily operate geographically. Storage however is more like water, where moving large amounts of data can be very challenging, especially over distance. In his session at 14th Cloud Expo, Joe Arnold...
IBM on Monday announced that businesses of all sizes – from start-ups to large enterprises - are rapidly adopting IBM Bluemix to develop software in the cloud with greater speed, security and quality. IBM also announced additional services on Bluemix, which will move from beta testin...
This report details findings from Forrester Research, Inc. about how the nine most significant solution providers for privileged identity management meet the 18-criteria evaluation and where they stand in relation to each other to help security and risk (S&R) professionals select the r...