Logo

IDS and log management for vCloud Air

  • Published in

Alert Logic says that its Alert Logic Threat Manager and Alert Logic Log Manager have achieved VMware Ready® – vCloud® AirTM status. This designation indicates that the products have undergone technical validation within the vCloud Air environment, and are supported on VMware vCloud Air.

Read More

CentriLogic acquires Adveniat Corporation

Adveniat expands CentriLogic’s global cloud, managed hosting and co-location footprint and enables e-commerce and digital media customers to achieve substantial income tax benefits.

Read More

G-Cloud: more needs to be done to make it work

By Campbell Williams, group strategy and marketing director at Six Degrees Group.

Read More

Perimeter based intelligence, the next step in data centre design

  • Published in

By Frank Denneman, technology evangelist at PernixData.

Read More

How should your organisation approach big data?

By Christian Toon, Head of Information Risk for Europe at Iron Mountain.

Read More

Banning Dropbox doesn’t work!

  • Published in

By Anders Lofgren Director of Mobility Solutions, Acronis.

Read More

Arkivum, in partnership with Google Cloud, awarded a role in multinational digital archiving...
Pure FlashArray and FlashBlade provide a robust and scalable storage solution for the RSC, which...
Lawrence Livermore National Laboratory has selected Supermicro to provide additional computing...
Second annual event brings together Commvault executives, customers, partners and other thought...
Supermicro announces rack scale air and liquid cooled solutions based on the X13 family of...
DataCore has given details of a new world record for price-performance using the industry’s...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more