Welcome!


Latest Articles from Web Security Journal
For Windows environments, it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently to restrict administrators so they only access the servers and resources required to perform their job and only during the approved times to...
If you're not virtualizing, you're missing reduced equipment, management, and utilities costs, along with increased server utilization rates and the right path to cloud computing. But when you virtualize, backup becomes even more of an issue. Traditional agent-based backup and recovery...
As a SaaS business matures, the importance and value of SaaS metrics increase. Most SaaS businesses begin their journey down the SaaS metrics path by tracking recurring revenue in relation to customer acquisition costs. After building a solid customer base, churn becomes a priority. Th...
To help maintain control and remain ever-ready for improvements, healthcare SaaS application developer PointClickCare recently adopted a cloud-based IT service management solution. Whether it's monitoring medication management in a closed-loop integration with pharmacies, or managing ...
Heartland, based in Princeton, New Jersey, has improved governance results in innovative ways across the organization, thanks to both security best practices and HP Fortify tools. Heartland Payment Systems has successfully leveraged software-assurance tools and best practices to driv...
There are two pieces of good news to come out of Heartbleed. First, we haven’t heard of any significant security breaches, which mean that the industry as a whole is getting better at fixing problems as they arise. The second is that, because Heartbleed presented every single cloud pr...
Solidifying its position as a leading IT infrastructure and cloud provider, Peak 10 has been named the first provider in the Americas to achieve the Cisco Powered Disaster Recovery as a Service (DRaaS) designation under the Cisco® Cloud and Managed Services Advanced Certification. This...
Arlington Computer Products improved their financial processes and operations using the new AribaPay cloud-based B2B payment service. Agile business services are entering into a new era, an integrated and on-demand approach to ordering, billing, and settlement processes between buyers...
AppDynamics is excited to unveil details behind our new Application Intelligence Platform which is the technology foundation for the AppDynamics portfolio of performance monitoring, automation and analytics solutions (transaction analytics was also announced today). Today’s software d...
SOASTA® Inc., on Tuesday announced that Huawei has selected SOASTA to provide continuous integration and robust functional test automation for its business and consumer offerings. Huawei will utilize SOASTA TouchTest and CloudTest for internal testing of Huawei’s apps, ensuring peak pe...
Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence. In its list of the eight most significant cybersecurity threats for 2013, Forbes c...
SYS-CON Events announced today that Silanis, the world’s leading electronic signature provider, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. Silanis is the world’s leading electron...
Learn how MedicAlert automated the functional, security, and performance testing for new APIs – enabling them to become an increasingly agile and valued provider of new healthcare information services. MedicAlert pioneered the use of medical ID products and delivers the most dependabl...
One challenge more and more enterprises are grappling with as they plan to adopt the cloud is data residency & sovereignty. They are finding that if they want to use a cloud service hosted outside of their borders, life can become quite complex. Perhaps it is a result of the often disc...
Many cloud hosting providers have achieved ticket-of-entry credibility in the data warehousing industry by building simple colocation centers. A first-tier database as a service (DBaaS) contender, however, is set apart by a value-added service approach that is strategic, consultative a...
Every company worries about competition. When I ran a large enterprise solutions organization, I took steps every day to ensure we were outpacing the competition. Frequently this involved making “build” vs “buy” decisions for the various product parts or services we needed to drive our...
As recent events have confirmed once again, no single company, organization or government is up to the task of securing the Internet. The never-ending cat and mouse game of exploits chasing vulnerabilities continues. The stunning Heartbleed discovery has shaken the online security esta...
CommVault on Tuesday announced new enhancements to its PartnerAdvantage program designed to help channel partners accelerate revenue growth and simplify collaboration as they expand into new markets, such as data protection, archiving, mobility and cloud services. The expanded program ...
Printing and the cloud are seemingly at opposite ends of an organization’s infrastructure spectrum. Printing remains one of the last bastions of an organization’s infrastructure that cannot be completely virtualized since the whole point of printing is to take something virtual and mak...
The market is full of buzz about cloud computing, and with it come sweeping claims about simplicity and savings. Deciding to migrate some or all database management to a cloud hosting provider, however, is a more complex undertaking than conventional wisdom may suggest. This white pa...
Next-Gen Cloud. Whatever you call it, there’s a higher calling for cloud computing that requires providers to change their spots and move from a commodity mindset to a premium one. Businesses can no longer maintain the status quo that today’s service providers offer. Yes, the continuit...
Enterprises are moving more and more applications to the cloud. Gartner predicts that the bulk of new IT spending by 2016 will be for cloud computing platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017.1 The far-reaching...
Web conferencing in a public cloud has the same risks as any other cloud service. If you have ever had concerns over the types of data being shared in your employees’ web conferences, such as IP, financials or customer data, then it’s time to look at web conferencing in a private cloud...
The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cl...
Cloud computing security can be a conundrum. The point of using the public cloud is to outsource certain infrastructure and application needs to third party providers, after all. How can you secure your data once it leaves your perimeter and your control? As puzzling as it may seem, th...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, Davi Ottenheimer, EMC Senior Director of Trust, will review hands-on lessons with IoT devices...
There has been a lot of media attention on Heartbleed and as always that means a lot of bizarre and often conflicting advice. I sat down (for a very long time) to find the truth of the matter and bring it together in one single article for those involved in enterprise mobility. "The ...
VASCO Data Security International, Inc., has announced on Tuesday that it will release its Q1 2014 results on Thursday, April 24th. On April 24, at 10.00 am EDT/16.00 CET, VASCO will hold a conference call, which will be streamed on the VASCO website. Mr. T. Kendall Hunt, Chairman an...
While Big Data and the cloud are often thought of as going hand in hand, some enterprises still hesitate to place large amounts of proprietary data online. Enterprises decide to keep their large data sets stored locally for a variety of reasons including the possibility of security bre...
SOASTA on Tuesday announced the company has expanded its award-winning mobile functional test automation solution, TouchTest, to include local test labs of Apple iOS and Google Android smart phones and tablets. The TouchTest Private Device Cloud is a simple to manage, affordable intern...
There are things we tend to take for granted in our everyday lives. We have certain expectations that don’t even have to be spoken, they’re just a given. If you walk into a room and turn on the light switch, the lights will go on, it’s assumed. If you turn the water faucet on, water wi...
SYS-CON Events announced today that BUMI, a premium managed service provider specializing in data backup and recovery, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. Manhattan-based ...
The selfie that changed the world, or at least Twitter, has been in the news for the past month. On March 2, 2014, the infamous Oscar selfie of Ellen and her celebrity friends broke a record of 2 million retweets before midnight the same night. That record was previously set by Preside...
Chief Security Officers (CSO), CIOs and IT Directors are all concerned with providing a secure environment from which their business can innovate and customers can safely consume without the fear of Distributed Denial of Service attacks. To be successful in today's hyper-connected worl...
Zetta.net is an enterprise-grade backup and disaster recovery provider. We have been in business for over five years, and we have over 800 enterprise customers and managed service providers (MSPs) that use or resell our product, as is the case with MSPs. In terms of the IT challenges,...
McAfee, part of Intel Security, on Wednesday outlined its strategy for enabling the secure Internet of Things. Utilizing McAfee’s history of securing the most demanding digital environments, McAfee is building and delivering future-focused security solutions that are essential to unlea...
Securing your data comes down to making both physical and virtual changes to your data center. From interior and exterior surveillance systems to software that detects system-level changes across remote and distributed locations, you must make use of any and all available strategies to...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization’s assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensi...
As organizations continue expanding their adoption of the public cloud, many IT and security professionals are beginning to see that they need improved cloud-monitoring and cloud-auditing capabilities. By cloud monitoring, I’m referring to the process of identifying cloud use within an...
The proliferation of cloud-based applications for the enterprise grows each day, and more and more professionals have grown dependent on these apps as the consumerization of IT flourishes in today’s mobile enterprise. With the consumerization of IT, employees have become their own IT e...