IT Infrastructure

August 04, 2021 Backup Solution Providers: Your First Mate on the Voyage Over the Sea of Change With Cloud Backups

Backup and recovery operations was once a set-it-and-forget it design architecture with a static reference architecture. Then along came the cloud, disrupting everything about how data is stored and processed. Now, more than ever, organizations are looking for their solution providers to lean in and help them navigate the shifting tides of “cloud backup.”

October 26, 2020 Lesson Learned From an Interview: AIOps Is Not Just About Tools

In this note, I interviewed Himadri Das, head of automation at TietoEVRY. Areas that were covered include important things businesses should consider for implementing AI-based solutions, the maturity level should their practices have, the possible risks of adopting AI, and areas of AIOps that need more improvement.

October 14, 2020 Morpheus Leads the Shift from Cloud Management Platform to Hybrid Cloud Application Orchestration with Its 5.0 Release

The Morpheus cloud management platform (CMP) has moved beyond its original focus on DevOps automation and self-service. Morpheus provides a management control plane to enable users to deploy workloads anywhere. Such a control plane is the way of the future for managing complex enterprise technology stacks.

August 21, 2020 Software Winners In a Post-Pandemic World – Atlassian Is a Refreshing Value Play

COVID-19 has forced software companies and their suppliers to refocus efforts around prioritizing systems and workflows that are nearly 100% digital in nature. As a result, Info-Tech has observed the quick emergence of six market themes that are highly relevant post COVID-19. This note series will profile key vendors and how they fit into the post-COVID-19 world.

August 05, 2020 IBM Raises Price on Software Support; Shoves Customers Toward the Cloud

IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.

August 05, 2020 Remote Work Landscape Pushes Microsoft to Releases Endpoint DLP and Double Key Encryption Features for Added Data Security

Microsoft recently previewed the specific features to tackle data security and risk management for end users with Microsoft Endpoint Data Loss Prevention (DLP) and Double Key Encryption. The reason for the launch? The increasing shift towards a remote work environment and a need to mitigate the accompanying risks.

August 05, 2020 Software Winners In a Post-Pandemic World – Microsoft Checks All the Boxes

COVID-19 has forced software companies and their suppliers to refocus efforts around prioritizing systems and workflows that are nearly 100% digital in nature. As a result, Info-Tech has observed the quick emergence of six market themes that are highly relevant after COVID-19. This note series will profile key vendors and how they fit into the post-COVID-19 world.

August 05, 2020 Qualys and Ivanti Partnership Boasts an Incredibly Robust Vulnerability Management Platform

Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.

July 23, 2020 RiskSense Releases a Unified Infrastructure Security Risk Management Program

RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.

July 21, 2020 DeviceLock Acquired by Cyberprotection Vendor Acronis

To bolster and broaden its data privacy capabilities for end users, cyber and data protection vendor Acronis has acquired DLP player DeviceLock. The acquisition aligns with the increasingly prevalent role that data privacy plays in cybersecurity.

July 20, 2020 Oracle Launches Cloud@Customer, Bringing the Autonomous Database to the Data Center

Oracle has announced the general availability of Exadata Cloud@Customer, a managed service that enables enterprises to unlock the previously cloud-first features of Oracle's Autonomous Database for on-premises data centers. This offering is ideal for enterprises that must conform with regulatory and/or technical challenges that force on-premises database residency.

July 20, 2020 Address the Root of Your Vulnerabilities in a Resource-Tight Period

Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.

July 15, 2020 Kenna Security Releases Tool for the Custom Benchmarking of Vulnerability Management Programs

On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.

July 10, 2020 GTB Technologies Adds Multi-Tenancy to DLP SDK

GTB Technologies, a smaller vendor known for dedicating itself solely to DLP solutions, has introduced a new multi-tenancy feature for its SDK that aims to improve quality and efficiency for DLP-integrated application development.

July 10, 2020 How Will Work From Home Change Vulnerability and Patch Management for Businesses in the Future?

COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.

June 12, 2020 Zecurion DLP 9 Recommended by SC Magazine

Zecurion has one of the most robust DLP products on the market and this fact was recently recognized by SC Magazine, who placed the product in its “pick-of-the-litter" category for DLP.

June 12, 2020 Zecurion DLP 10 New Features: User Behavior Analytics

Among the full set of features available in Zecurion’s new DLP product is the ability to perform user behavior analytics to help spot data loss events before they occur.

June 01, 2020 Acronis Cyber Protect Cloud Turns Managed Service Providers Into Managed Security Providers

More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers. Trust and peace of mind are the core tenets of what they are selling and solutions like Acronis Cyber Protect Cloud can provide the platform upon which to deliver on those promises.

May 27, 2020 Kenna Security Offers Vulnerability Management Options: Kenna.VM & Kenna.VI

Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.

May 11, 2020 Rapid7 Penetration Tests Show That Businesses Are Getting Better at Network Security

We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.

April 30, 2020 Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?

The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.