Topic: security

Dell updates ProSupport suite and security capabilities

Dell announced added capabilities to ProSupport Suite for PCs to make IT support easier and more customizable through the use of AI and new endpoint security offerings.  The enhancements include greater IT visibility, remote remediation, actionable recommendations, and automated custom update catalog management and deployment capabilities. “If your PCs aren’t productive, your employees aren’t either,” … continue reading

NS1 announces DDoS overage protection

The application traffic intelligence and automation provider NS1 announced DDoS Overage Protection, which prevents unexpected cost increases in the event of usage spikes due to distributed denial-of-service (DDoS) attacks against NS1’s Managed DNS. The number of DDoS attacks has jumped by 200% since last year and attack intensity grew by 300%.  “Business resilience is synonymous … continue reading

Commvault announces new ransomware protection service

Commvault announced new ransomware services that help businesses prepare for, protect against, and respond to a growing number of cyber threats.  The new Commvault Ransomware Protection and Response Services offering provides the resources and expertise that is needed to protect customers’ Commvault solutions from an attack, review the state of their data protection solution over … continue reading

IBM expands zero trust strategy

IBM expanded its zero trust strategy with new Secure Access Service Edge (SASE) services to help modernize network security.  SASE is a new architecture model designed to address the requirements of organizations that are digitally transforming, adopting cloud and SaaS applications, and providing services to a hybrid workforce and customer base.  The new service leverages … continue reading

DH2i launches free DxEnterprise & DxOdyssey Developer Editions

DH2i announced the launch of developer editions of its DxEnterprise and DxOdyssey software, which offer free licenses for non-production use and trials.  DxEnterprise enables users to manage and ensure high availability (HA) for a variety of workloads such as SQL Server at the instance level and also SQL Server availability groups inside or outside containers.  … continue reading

CSA releases Cloud Threat Modeling guide

The Cloud Security Alliance (CSA) has released a new Cloud Threat Modeling guide to help provide guidance on threat modeling for cloud applications, their services, and related security decisions.  The guide was written by the CSA Top Threats Working Group. The group hopes that the Cloud Threat Modeling guide will provide organizations with an up-to-date … continue reading

Microsoft acquires CloudKnox Security for privileged access capabilities

Microsoft announced that it acquired the cloud Cloud Infrastructure Entitlement Management (CIEM) provider CloudKnox Security to offer unified privileged access and cloud entitlement management.  “The company’s solution helps organizations right-size permissions and consistently enforce least-privilege principles to reduce risk, and it employs continuous analytics to help prevent security breaches and ensure compliance. This strengthens our … continue reading

ITOps Times Open-Source Project of the Week: MicroK8s

MicroK8s allows for low-ops, minimal production Kubernetes for devs, cloud, clusters, workstations, edge and IoT.  It is a Cloud Native Computing Foundation (CNCF) certified upstream Kubernetes deployment that runs entirely on your workstation or edge device. The project automatically chooses the best nodes for the Kubernetes datastore, and when a cluster database is lost, another … continue reading

IBM adds enhanced data protection to FlashSystem

IBM announced that it is bringing advanced data protection capabilities to the IBM FlashSystem family of all flash arrays to help companies plan for and recover quickly from ransomware and cyberattacks.  IBM Safeguarded Copy, which automatically creates data copies in “immutable snapshots,” will now be integrated into the IBM FlashSystem family. In the event of … continue reading

Report: 94% of organizations have suffered from insider data breaches

A lot of focus is made on hardening systems from outside attacks, but threats from within the company shouldn’t be ignored. Results from Egress’ Insider Data Breach Survey 2021 showed that 94% of organizations have fallen victim to insider data breaches in the last year alone.  The survey was conducted by Arlington Research on behalf … continue reading

Cloud Security Alliance releases Enterprise Architecture Reference Guide v2

The Cloud Security Alliance announced the release of the Enterprise Architecture Reference Guide v2, which provides users with a compilation of every domain and container within the CSA Enterprise Architecture v2.3.  “This reference guide is fundamentally important for risk managers in evaluating opportunities for improvement, creating road maps for technology adoption, identifying reusable security patterns, … continue reading

VMware unveils Anywhere Workspace for distributed organizations

VMware wants distributed organizations to be able to embrace work from anywhere with the release of its Anywhere Workspace. The new solution aims to manage multi-modal employee experience while providing better security at the edge and reducing costs and operational overhead.  “Organizations are facing many challenges, such as ensuring good connectivity for remote employees, monitoring … continue reading

1 3 4 5 6 7 19

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!