Tag Archives: security solutions

Security as a Service: The Cloud Alternative

Security as a Service: The Cloud Alternative

Security as a Service: the cloud alternative The malware storm puts businesses in a corner bounded by security, performance, and cost—is there a way out? Yes there is—and fittingly, it leads right back to the Web. Security as a Service, or SaaS, is a comprehensive set of security applications, delivered to clients as services through…

SurePass and Microsoft Windows Azure Introduce Secure Cloud Services (SCS)

SurePass and Microsoft Team on Preventing Data Breaches SurePass has launched a comprehensive suite of Secure Cloud Services (SCS), which run on Windows Azure. This collaboration will enable both technology providers and application developers to deploy the additional security elements needed to deliver a secure application to their clients. SurePass is a software and hardware…

Broadcom Secures Cloud Computing with Its SoC Family

Broadcom Secures Cloud Computing with Its SoC Family Broadcom has announced two additions to its security system-on-a-chip (SoC) family that effectively secure tablet, PC, and Cloud Computing. The global provider of semiconductor solutions for wired and wireless communications has unveiled the BCM5882 and BCM5883, and claims that they are the most highly integrated secure SoC…

Microsoft 'Intune' With New Cloud Management Service

Microsoft Intune With Cloud Management Service REDMOND, Wash. – March 23, 2011 – When Microsoft PC management and security solutions go to the cloud, the result is Windows Intune – a new Microsoft product to help businesses manage, secure and update their fleet of PCs.  Windows Intune is a cloud-based solution that lets IT pros…

Acronis And Red Hat Partner To Enable Expanded Virtualization Capabilities For Enterprises

Acronis and Red Hat Partner to Enable Expanded Virtualization Capabilities for Enterprises RALEIGH, N.C. and WOBURN, MASS., – March 14, 2011 – Red Hat, Inc., the (NYSE: RHT) world’s leading provider of open source solutions, and Acronis, a leading provider of backup, recovery and security solutions for physical, virtual and cloud environments, today announced that…

MimeCast Chief Scientist & Chief Security Officer Discuss Cloud Security

MimeCast Chief Scientist & Chief Security Officer Discuss Cloud Security In your own words, please describe Mimecast and the company’s service to readers. Nathaniel: Mimecast is a cloud-based email management company. We provide our customers with a unified solution for their company’s email that incorporates security, business continuity, storage, and eDiscovery solutions. With Mimecast, companies’…

SaaS Market Is Growing Faster Than On-Premise: Marc Olesen, McAfee

By Varun Aggarwal What portion of your revenue comes from SaaS offerings? How do you expect it to grow? Globally, our SaaS business constitutes 5-10 percent of our revenue. We expect this to grow to 10-15 percent in the next couple of years. IDC has predicted a growth of 27 percent in the Security-as-a-Service (SaaS)…

Sentrigo Wins 2010 Cloud Computing World Series Award

Hedgehog Enterprise for Database Security and Compliance Recognized in the ‘Best Security Solution’ Category Santa Clara, CA (PRWEB) July 6, 2010 — Sentrigo, Inc., the innovator in database security software, today announced that Hedgehog Enterprise was selected as a winner in the 2010 Cloud Computing World Series Awards. The leading database security and compliance solution…

Featured Writers

Top Viral Impact

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,…

Advertising Programs

Click To Find Out More!!

Sponsored Posts

Sponsored Posts

Sponsored Posts We have a dedicated readership, through our online, social media and email presence. Our goal is to continue to build our growing community, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more. In order to do so, we require the support from businesses looking to generate more exposure for…