Welcome!


Latest Articles from Web Security Journal
A global asset management company needed to accelerate testing for parallel and Agile development. Learn how service virtualization and API test automation resulted in a 20X reduction in testing time. Ignis Asset Management is a global asset management company, headquartered in London...
“While cost has traditionally been a foundational benefit of the cloud, we believe that other factors can play a more important part in defining the cloud of tomorrow,” said Todd Gleason, Vice President of Technology at FireHost, in this exclusive Q&A with Cloud Expo conference chairs ...
With large security breaches constantly in the news, businesses are rightly concerned about security. Thankfully, big data and machine learning can work together to help. They read like a list of horror stories for businesses big and small alike. Sony’s PlayStation Network is hacked t...
Until this week the biggest anxiety when dealing with eBay has likely been fretting over a negative rating, concerns about slow shipping or a delayed refund. Then suddenly yesterday the media jumped all over the story that eBay had been hacked and users need to change their passwords. ...
Today, more than ever, end user experience is at the forefront of every CTO and CMO’s mind as more statistics show websites and applications are easily abandoned if users are not satisfied with their experience. But what makes a good experience? First we need to ask ourselves what is ...
Over the last months organizations' employees have embraced the BYOD practices, CIOs are concerned about security issues, lawyers have given their advice, and MDM vendors have taken their message to the companies. But while CIOs try to come up with the best solution to police this prac...
This report details findings from Forrester Research, Inc. about how the nine most significant solution providers for privileged identity management meet the 18-criteria evaluation and where they stand in relation to each other to help security and risk (S&R) professionals select the r...
The MAS guidelines for Internet Banking and Technology Risk Management (TRM), issued in June 2013, identify security and risk management issues in a comprehensive manner, covering everything from identity assurance and access controls to accountability and audit. This white paper detai...
Distrix, ein führender Entwickler von softwaredefinierten WAN-Produkten, die einfache, sichere und belastbare Netzwerke ermöglichen, gab heute die Änderung seines Namens von Spark Integration Technologies zu Distrix bekannt. Der neue Name spiegelt den Erfolg des Unternehmens beim Einsa...
When we think about what’s next, our frame of reference is almost universally anchored to what we are doing now. We look at how things are, and then we aim our sights forward. In some cases, we might make incremental moves ahead; in other cases, maybe we look for improvement by orders ...
SOASTA on Tuesday announced that it has entered into a technology and distribution partnership agreement with CA Technologies. The partnership will integrate SOASTA's Cloud based Web testing solution, CloudTest with CA Service Virtualization and CA LISA Test software suites. The soluti...
Risk-conscious enterprises across the globe have been reluctant to embrace the public cloud model. For many, compliance requirements are the source of the reluctance. For others, concerns about ceding control of their data to a cloud service provider, without the cloud service provider...
Reduce networking costs! Increase cyber security! Deploy applications faster! Add connectivity to our new office now! We’re under attack now – drop everything and jump on it now! How does IT management keep up with these demands? On top of that challenge, the promises of the Internet o...
Last month, the Information Security Forum released their annual prediction of the top 10 information security threats they foresee for the next two years – through 2016. While I found the entire list insightful, half of the list resonated strongly with me as someone who is working wit...
InMage on Monday announced the release of Scout 7.1, enabling customers to leverage the public, hosted and private cloud as a target for backup and/or disaster recovery (DR). This next generation solution for hybrid cloud backup, recovery and migration is available in three form factor...
Companies are bracing for the challenge of upgrading hundreds or thousands of servers ahead of the "end of life" of Windows Server 2003 in July, 2015. Join this informative webinar to hear Microsoft's recommendations and see a demonstration of AppZero, the only automated way to "uplev...
For Windows environments, it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently to restrict administrators so they only access the servers and resources required to perform their job and only during the approved times to...
If you're not virtualizing, you're missing reduced equipment, management, and utilities costs, along with increased server utilization rates and the right path to cloud computing. But when you virtualize, backup becomes even more of an issue. Traditional agent-based backup and recovery...
As a SaaS business matures, the importance and value of SaaS metrics increase. Most SaaS businesses begin their journey down the SaaS metrics path by tracking recurring revenue in relation to customer acquisition costs. After building a solid customer base, churn becomes a priority. Th...
To help maintain control and remain ever-ready for improvements, healthcare SaaS application developer PointClickCare recently adopted a cloud-based IT service management solution. Whether it's monitoring medication management in a closed-loop integration with pharmacies, or managing ...
Heartland, based in Princeton, New Jersey, has improved governance results in innovative ways across the organization, thanks to both security best practices and HP Fortify tools. Heartland Payment Systems has successfully leveraged software-assurance tools and best practices to driv...
There are two pieces of good news to come out of Heartbleed. First, we haven’t heard of any significant security breaches, which mean that the industry as a whole is getting better at fixing problems as they arise. The second is that, because Heartbleed presented every single cloud pr...
Solidifying its position as a leading IT infrastructure and cloud provider, Peak 10 has been named the first provider in the Americas to achieve the Cisco Powered Disaster Recovery as a Service (DRaaS) designation under the Cisco® Cloud and Managed Services Advanced Certification. This...
Arlington Computer Products improved their financial processes and operations using the new AribaPay cloud-based B2B payment service. Agile business services are entering into a new era, an integrated and on-demand approach to ordering, billing, and settlement processes between buyers...
AppDynamics is excited to unveil details behind our new Application Intelligence Platform which is the technology foundation for the AppDynamics portfolio of performance monitoring, automation and analytics solutions (transaction analytics was also announced today). Today’s software d...
SOASTA® Inc., on Tuesday announced that Huawei has selected SOASTA to provide continuous integration and robust functional test automation for its business and consumer offerings. Huawei will utilize SOASTA TouchTest and CloudTest for internal testing of Huawei’s apps, ensuring peak pe...
Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In its list of the eight most significant cybersecurity threats for 2013, Forbes c...
SYS-CON Events announced today that Silanis, the world’s leading electronic signature provider, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. Silanis is the world’s leading electron...
Learn how MedicAlert automated the functional, security, and performance testing for new APIs – enabling them to become an increasingly agile and valued provider of new healthcare information services. MedicAlert pioneered the use of medical ID products and delivers the most dependabl...
One challenge more and more enterprises are grappling with as they plan to adopt the cloud is data residency & sovereignty. They are finding that if they want to use a cloud service hosted outside of their borders, life can become quite complex. Perhaps it is a result of the often disc...
Many cloud hosting providers have achieved ticket-of-entry credibility in the data warehousing industry by building simple colocation centers. A first-tier database as a service (DBaaS) contender, however, is set apart by a value-added service approach that is strategic, consultative a...
Every company worries about competition. When I ran a large enterprise solutions organization, I took steps every day to ensure we were outpacing the competition. Frequently this involved making “build” vs “buy” decisions for the various product parts or services we needed to drive our...
As recent events have confirmed once again, no single company, organization or government is up to the task of securing the Internet. The never-ending cat and mouse game of exploits chasing vulnerabilities continues. The stunning Heartbleed discovery has shaken the online security esta...
CommVault on Tuesday announced new enhancements to its PartnerAdvantage program designed to help channel partners accelerate revenue growth and simplify collaboration as they expand into new markets, such as data protection, archiving, mobility and cloud services. The expanded program ...
Printing and the cloud are seemingly at opposite ends of an organization’s infrastructure spectrum. Printing remains one of the last bastions of an organization’s infrastructure that cannot be completely virtualized since the whole point of printing is to take something virtual and mak...
The market is full of buzz about cloud computing, and with it come sweeping claims about simplicity and savings. Deciding to migrate some or all database management to a cloud hosting provider, however, is a more complex undertaking than conventional wisdom may suggest. This white pa...
Next-Gen Cloud. Whatever you call it, there’s a higher calling for cloud computing that requires providers to change their spots and move from a commodity mindset to a premium one. Businesses can no longer maintain the status quo that today’s service providers offer. Yes, the continuit...
Enterprises are moving more and more applications to the cloud. Gartner predicts that the bulk of new IT spending by 2016 will be for cloud computing platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017.1 The far-reaching...
Web conferencing in a public cloud has the same risks as any other cloud service. If you have ever had concerns over the types of data being shared in your employees’ web conferences, such as IP, financials or customer data, then it’s time to look at web conferencing in a private cloud...
The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cl...