Welcome!


Latest Articles from Web Security Journal
Expand on-premise identity management capabilities by utilizing the flexibility and agility of an IDaaS and SSO to augment permissions for cloud-based apps. The modern enterprise is a fluid entity. As an IT construct it expands and contracts (sometimes simultaneously), and many of the...
A newly released report from McKinsey & Company, Risk and Responsibility in a Hyperconnected World: Implications for Enterprises, highlights the findings of a year’s worth of McKinsey research conducted in partnership with the World Economic Forum. Based on the interviews with over 200...
AppZero, the fastest way to move enterprise applications, today announced the results of its first "State of Readiness for Windows Server 2003 End of Support (EOS)" survey. The 2013 results of more than 200 Fortune 1,000 companies show that 40% of respondents wish to move to the cloud...
Veeam® Software on Tuesday announced record revenue results for the fourth quarter and full year of 2013. This marks Veeam’s 24th consecutive quarter in which quarterly bookings revenue has grown by more than 50 percent over the same period during the previous year. In 2013, annual b...
As companies produce an ever-increasing amount of data that’s pushing network and bandwidth capacity to its extremes, virtual desktop infrastructure (VDI) is becoming a popular solution to these concerns and as an effective platform for a BYOD policy. During the recent bout of intense...
We're in the middle of another major shift in computing and IT: the decline of the hard disk and the rise of solid-state memory. Solid-state has been around for a while, but it's always been expensive, volatile and low capacity. That's changing, and it's changing IT as well. Computing...
Traditional BYOD policies had two main concerns: Companies worried about security; employees worried about privacy. VDIs are almost perfectly suited to solve these BYOD issues. Bring Your Own Device policies have fascinated both the corporate world and the tech world for some time now...
Global information technology networks that are rich in services are typically complex and require hard-to-manage security solutions. The latest versions of next-generation firewalls now offer multiple security layers that can complicate management, particularly as more and more featur...
So many organizations switched to third-party help desk solutions without really putting in place any performance measures or tracking mechanisms to really measure how good – or bad – the support is. Some executives got a big bonus for “thinking out of the box” and coming up with a c...
In the race to implement Continuous Delivery, emphasis on build-and-deploy has overshadowed Continuous Testing. Service Virtualization's simulation technology allows you to test your component in a complete environment—any time you want. "Part of the problem with service virtualizati...
Rather than talking about what others should do or consider for their data protection needs, for this post I wrote down some notes using my Livescribe about what I need and want for my environment. As part of walking the talk in future posts I'm going to expand a bit more on what I'm d...
“Cloud computing” is more than just a buzzword – it has transformed the tech industry. Having been in the business of building enterprise infrastructure for over 15 years, I’ve had the opportunity to witness how cloud has altered the landscape, including most recently at my company, Ne...
Much of the dialog over net neutrality seems rather dated. This is understandable, since the debate has been going on since last century. The January 14th Federal Appeal Court decision in favor of the Internet access providers gave those companies (apparently) a degree of latitude to ...
This is the second of a three-part series (read part I here) about how vendors are keeping backup alive, however what they can and should do to shift and expand the conversation to data protection and related themes. Modernizing data protection and what to do about it Building off of...
Federal records management is an increasingly complex undertaking in the era of big data. Three principles are needed for success in records management: capture on creation; manage and secure through the workflow; and archive responsibly.
We all know the story of Goldilocks and the three bears, but have you heard the one about Goldie Locks and the three clouds? This tale is playing out throughout the IT marketplace. Goldie Locks – an IT executive for a state government – has once again found herself in a dilemma. “If o...
Olivier Amar loves the Internet and the experience that a good application can provide by accessing your data. But with years of experience in online performance marketing for companies like AIG, WSOP, Harrahs, ElAl, GetTaxi and Toyga Financial, he understands how exposed our personal ...
In my last blog, I discussed the debate surrounding the true definition of open and unfettered Internet, and the different interpretations various groups and individuals have on the matter. In this posting, we continue the discussion. The U.S. government has not enacted legislation to...
“Regulations and compliance are key trust topics with regards to cloud solutions and technology,” noted Sven Denecken, Vice President, Strategy and Co-Innovation Cloud Solutions, SAP AG, in this exclusive Q&A with Cloud Computing Journal. “But it is also more than security of access – ...
TwinStrata on Wednesday announced the results of its "Industry Trends: Data Backup in 2014" survey. Conducted between December 2013 and January 2014, the report analyzes responses from 209 IT personnel. The results indicate an urgent need for organizations to make significant improve...
The era of Big Data is upon us. Data is growing in volume, variety and velocity. At the same time, cybercrimes, breaches and advanced persistent threats are increasing at an alarming rate. As a result, the pressure is on to protect critical data and demonstrate compliance to a growing ...
Cloud hosting has been creating quite a buzz lately as being the latest, and some claim also the best type of web hosting around. It is quite different to your usually hosting server and certainly requires a lot of skill to use. Most of the time it cannot be run by a single person, but...
Employees using mobile devices to access popular and often times essential cloud applications continue to increase in the workplace, both via private devices and those owned by the enterprise. This increase in use brings with it important data security issues for the enterprise. Some e...
Yesterday one of the biggest outages in history, if not the biggest outage, happened to the Internet in China. Primarily and directly affected by that outage were most of the people living in China and browsing the Internet in China. Secondary, all companies doing online business in C...
If last year underscored anything, it was the significant and far-reaching impact of breaches by trusted insiders – case in point, the Edward Snowden affair. What makes this such a critical trend for 2014 is the fact that as more and more organizations are adopting cloud strategies, th...
OpenText Corporation has announced that it has completed its acquisition of GXS Group, Inc. (GXS), expanding OpenText's leadership in EIM by combining OpenText's Information Exchange portfolio with GXS's cloud-based business-to-business integration services and managed services. "I a...
Recent reports of a massive data breach affecting popular sites like Facebook, Twitter, Google and Yahoo have many companies rethinking security practices and wondering how to protect vital data. If your company uses cloud services to conduct business and manage data or is contemplatin...
2013 was a banner year for cloud backup adoption. It was also a year of wake-up calls: simple cloud backup doesn't constitute DR, transfer speeds are vital, and beware cloud as a commodity. Let's look to 2014 for more trends in cloud backup and DR in the cloud. This trend showed up in...
Coalfire has launched HIPAAcentral, a new compliance exchange that provides a comprehensive suite of services for covered entities and business associates and their subcontractors to manage, maintain and exchange healthcare regulatory compliance data. “The U.S. Department of Health an...
Industrial and Embedded service provider, Innodisk, is introducing a new line of peripheral modules for embedded applications. Users will be able to interface to LAN, serial ports (USB/RS232-422-485/PCIe), storage devices and video displays easily through these space-efficient embedded...
Cloud computing continues to transform the way organization are doing business, proving to be a transformative innovation for many enterprises. Considering how far the cloud has come in recent years spurs questions of what the future will look like and what types of changes we can expe...
I had the privilege of interviewing mobility expert Vaidy Iyer today. He is the founder and CEO of AppsFreedom, a company focused on providing enterprise mobility solutions in the form of Multi-Channel, Multi-Device Platform as a Service solutions to the SAP community. I asked if the...
Innodisk, a designer and manufacturer of SSDs for industrial applications, is committed to providing flash storage solutions that meet the unique security demands of the gaming and amusement industry without sacrificing reliability and performance. With its release of a new series of c...
In a previous blog on Cloud Services Brokerage (CSB), I promised to return briefly to the topic of CSB monetization. The term CSB can refer to both to the activity of brokering cloud services, or to the software application (or suite of applications) used to manage that activity. The ...
With the "API economy" dominating the headlines in 2013, it's no surprise that Parasoft saw a surge of interest in how to ensure API reliability, security, and performance. Here's a recap of the 13 most-accessed API Integrity resources from 2013... API Integrity: How Buggy Are Today's...
LSI Corporation on Monday announced that LSI® Nytro™ flash accelerator cards have been selected as the PCIe® flash acceleration technology for Oracle’s next-generation Database Machine, Oracle Exadata X4. In addition, the companies have collaborated on bringing a new LSI Nytro technolo...
Savvy organizations, HP among them, are turning to preventing attacks, rather than just detecting them and remediating them. The high cost of unwanted intrusion and malware across corporate networks is well known. Less talked-about are the successful ways that organizations are thwart...
"Everybody is sharding because the data is getting bigger and bigger so there are just more ways to do it. The thing about sharding is you have to take Big Data and spread it across a lot of servers – that’s the most important thing," explained Cory Isaacson, CEO/CTO of CodeFutures Cor...
We live in a world that requires us to compete on our differential use of time and information, yet only a fraction of information workers today have access to the analytical capabilities they need to make better decisions. Now, with the advent of a new generation of embedded business ...
It’s been a great 2013. Out of the global $1.2 trillion dollars’ worth of business conducted online in 2013 across the globe, SOASTA is trusted with protecting 10% of that figure – or $150 billion. Based on the hundreds of brands SOASTA worked with this year and listened to the challen...