Tag Archives: management capabilities

CenturyLink Technology Solutions Uses IO Technology To Open Multi-Megawatt Data Centers

CenturyLink Technology Solutions Uses IO Technology To Open Multi-Megawatt Data Centers

MONROE, La., and PHOENIX – January 29, 2014 – CenturyLink (NYSE: CTL) and IO today announced a strategic agreement to expand the CenturyLink Technology Solutions colocation footprint using IO’s Intelligent Control technology platform, with initial deployments at IO Phoenix and nearby IO Scottsdale. CenturyLink Technology Solutions, which formerly operated under the name Savvis, will enter the Phoenix market as

FacebookTwitterLinkedInGoogle+Share
Bare-Metal Cloud: Meeting The Demand For High-Performance Cloud Solutions

Bare-Metal Cloud: Meeting The Demand For High-Performance Cloud Solutions

Meeting The Demand For High-Performance Cloud Solutions Organizations have been flocking to cloud infrastructure services in an effort to cut IT costs while capitalizing quickly on technology innovations. The driving force is almost always the desire for flexibility, scalability and efficiency. And the cloud generally delivers on this promise with its foundation of virtualization, automation

Egnyte Delivers Mobile Data Management Suite For Comprehensive Device Security In The Enterprise

Egnyte Delivers Mobile Data Management Suite For Comprehensive Device Security In The Enterprise

Delivers Mobile Data Management Suite for Comprehensive Device Security in the Enterprise First File Sync and Share Vendor to Offer Native Remote Wipe, Encryption, Trusted Device and Two-Factor Authentication Features LONDON, UK – May 22, 2013 – Egnyte, the leader in enterprise file sharing and synchronization, today announced its Mobile Data Management Suite, giving enterprises

Access Management In A Cloudy, Mobile World

Access Management In A Cloudy, Mobile World Lately, I’ve noticed that user access management is a recurring topic of discussion with customers and partners. Two major trends transforming industries today – mobile and cloud – are acting as catalysts for a renewed focus on this critical area of security. As mobile devices proliferate at a