Welcome!


Latest Articles from Web Security Journal
The initial wave of data efficiency features for primary storage focus on silos of information organized in terms of individual file systems. Deduplication and compression features provided by some vendors are limited by the scalability of those underlying file systems, essentially the...
October 1, 2013, was the most anticipated date for the Obama administration since his re-election. It was to be the day every American would have access to health care on one centralized website. However, according to at least one report only six people enrolled in Obamacare on the fir...
IDenticard® Access Control is a leading manufacturer of integrated access control solutions to protect employees, visitors, and facilities. Owned by Brady Corporation (NYSE:BRC), a $1.15 billion manufacturer of identification products, IDenticard Access Control draws on its 30 years of...
What have you done online today – checked LinkedIn? Facebook? Twitter? Opened and sent business emails? Used business apps? Every business employee also has a private life – and it’s becoming increasingly difficult to keep the two separate. Rather than ignoring the growing role of soci...
Last year’s revelations of government surveillance programs by the NSA and others, along with possible lack of enforcement of the Safe Harbor program by the FTC, caused the European Civil Liberties Committee to recommend suspending the entire EU-U.S. Safe Harbor approach. If the recomm...
Egnyte, the provider of the most comprehensive file-sharing platform for the enterprise, has announced its global expansion plans, with the establishment of regional centers in Spokane, Washington and New York, as well as a European headquarters in London and broadened operations in Po...
BYOD may be the word of the day on the street but underlying the "come as you are" approach to computing is a variety of technology that enables organizations to confidently take up the gauntlet thrown down by users to support their demand to use the computing platform of their choice....
The cloud’s main story so far has been one of horizontal providers, such as salesforce.com, Microsoft and Amazon, offering one-size-fits-all solutions. While these providers had some success in the financial services sector, their products weren’t specialized enough to address the need...
Rob Wigley is Director, Cybersecurity Consulting Services at HP Enterprise Services, U.S. Public Sector. He has more than 30 years of information technology experience supporting manufacturing, high tech, healthcare, and public sector market segments. For the last 10 years, he has focu...
Worldwide IT spending is projected to rise US$3.8 trillion in 2014 according to recent Gartner research, a 3.1 percent increase from spending in 2013, which was $3.7 trillion. While not a huge jump in dollars, it does indicate that companies have been conserving cash over the past few ...
Virtualization can significantly reduce costs for organizations but to ensure that risk of outage and data loss is mitigated, organizations should ensure that their backup provider meets certain qualifications.
How can your business benefit from using the cloud? We hear the term all the time in the tech world, but it's never really clearly defined. Those of us who are using social media or saving data with online sources are already using it. Perhaps you just didn't know it. Amazon is one of ...
Given the business expectations at each stage of the SDLC, Continuous Testing delivers a quantitative assessment of risk as well as actionable tasks that help mitigate these risks before they progress to the next stage of the SDLC. The goal is to eliminate meaningless tests and produc...
Storing important information around the office has always been the go-to format for saving essential data. Of course, having it somewhere on hand provides peace of mind, as you know it is literally held within your building, so when someone needs a hard copy, you are able to go out an...
Expand on-premise identity management capabilities by utilizing the flexibility and agility of an IDaaS and SSO to augment permissions for cloud-based apps. The modern enterprise is a fluid entity. As an IT construct it expands and contracts (sometimes simultaneously), and many of the...
A newly released report from McKinsey & Company, Risk and Responsibility in a Hyperconnected World: Implications for Enterprises, highlights the findings of a year’s worth of McKinsey research conducted in partnership with the World Economic Forum. Based on the interviews with over 200...
AppZero, the fastest way to move enterprise applications, today announced the results of its first "State of Readiness for Windows Server 2003 End of Support (EOS)" survey. The 2013 results of more than 200 Fortune 1,000 companies show that 40% of respondents wish to move to the cloud...
Veeam® Software on Tuesday announced record revenue results for the fourth quarter and full year of 2013. This marks Veeam’s 24th consecutive quarter in which quarterly bookings revenue has grown by more than 50 percent over the same period during the previous year. In 2013, annual b...
As companies produce an ever-increasing amount of data that’s pushing network and bandwidth capacity to its extremes, virtual desktop infrastructure (VDI) is becoming a popular solution to these concerns and as an effective platform for a BYOD policy. During the recent bout of intense...
We're in the middle of another major shift in computing and IT: the decline of the hard disk and the rise of solid-state memory. Solid-state has been around for a while, but it's always been expensive, volatile and low capacity. That's changing, and it's changing IT as well. Computing...
Traditional BYOD policies had two main concerns: Companies worried about security; employees worried about privacy. VDIs are almost perfectly suited to solve these BYOD issues. Bring Your Own Device policies have fascinated both the corporate world and the tech world for some time now...
Global information technology networks that are rich in services are typically complex and require hard-to-manage security solutions. The latest versions of next-generation firewalls now offer multiple security layers that can complicate management, particularly as more and more featur...
So many organizations switched to third-party help desk solutions without really putting in place any performance measures or tracking mechanisms to really measure how good – or bad – the support is. Some executives got a big bonus for “thinking out of the box” and coming up with a c...
In the race to implement Continuous Delivery, emphasis on build-and-deploy has overshadowed Continuous Testing. Service Virtualization's simulation technology allows you to test your component in a complete environment—any time you want. "Part of the problem with service virtualizati...
Rather than talking about what others should do or consider for their data protection needs, for this post I wrote down some notes using my Livescribe about what I need and want for my environment. As part of walking the talk in future posts I'm going to expand a bit more on what I'm d...
“Cloud computing” is more than just a buzzword – it has transformed the tech industry. Having been in the business of building enterprise infrastructure for over 15 years, I’ve had the opportunity to witness how cloud has altered the landscape, including most recently at my company, Ne...
Much of the dialog over net neutrality seems rather dated. This is understandable, since the debate has been going on since last century. The January 14th Federal Appeal Court decision in favor of the Internet access providers gave those companies (apparently) a degree of latitude to ...
This is the second of a three-part series (read part I here) about how vendors are keeping backup alive, however what they can and should do to shift and expand the conversation to data protection and related themes. Modernizing data protection and what to do about it Building off of...
Federal records management is an increasingly complex undertaking in the era of big data. Three principles are needed for success in records management: capture on creation; manage and secure through the workflow; and archive responsibly.
We all know the story of Goldilocks and the three bears, but have you heard the one about Goldie Locks and the three clouds? This tale is playing out throughout the IT marketplace. Goldie Locks – an IT executive for a state government – has once again found herself in a dilemma. “If o...
Olivier Amar loves the Internet and the experience that a good application can provide by accessing your data. But with years of experience in online performance marketing for companies like AIG, WSOP, Harrahs, ElAl, GetTaxi and Toyga Financial, he understands how exposed our personal ...
In my last blog, I discussed the debate surrounding the true definition of open and unfettered Internet, and the different interpretations various groups and individuals have on the matter. In this posting, we continue the discussion. The U.S. government has not enacted legislation to...
“Regulations and compliance are key trust topics with regards to cloud solutions and technology,” noted Sven Denecken, Vice President, Strategy and Co-Innovation Cloud Solutions, SAP AG, in this exclusive Q&A with Cloud Computing Journal. “But it is also more than security of access – ...
TwinStrata on Wednesday announced the results of its "Industry Trends: Data Backup in 2014" survey. Conducted between December 2013 and January 2014, the report analyzes responses from 209 IT personnel. The results indicate an urgent need for organizations to make significant improve...
The era of Big Data is upon us. Data is growing in volume, variety and velocity. At the same time, cybercrimes, breaches and advanced persistent threats are increasing at an alarming rate. As a result, the pressure is on to protect critical data and demonstrate compliance to a growing ...
Cloud hosting has been creating quite a buzz lately as being the latest, and some claim also the best type of web hosting around. It is quite different to your usually hosting server and certainly requires a lot of skill to use. Most of the time it cannot be run by a single person, but...
Employees using mobile devices to access popular and often times essential cloud applications continue to increase in the workplace, both via private devices and those owned by the enterprise. This increase in use brings with it important data security issues for the enterprise. Some e...
Yesterday one of the biggest outages in history, if not the biggest outage, happened to the Internet in China. Primarily and directly affected by that outage were most of the people living in China and browsing the Internet in China. Secondary, all companies doing online business in C...
If last year underscored anything, it was the significant and far-reaching impact of breaches by trusted insiders – case in point, the Edward Snowden affair. What makes this such a critical trend for 2014 is the fact that as more and more organizations are adopting cloud strategies, th...
OpenText Corporation has announced that it has completed its acquisition of GXS Group, Inc. (GXS), expanding OpenText's leadership in EIM by combining OpenText's Information Exchange portfolio with GXS's cloud-based business-to-business integration services and managed services. "I a...