Storage Management

Strategies for Data Storage Ransomware Protection

As ransomware groups develop more creative strategies to exploit IT vulnerabilities and encrypt data, enterprises are working to keep up and implementing new solutions...

Fortinet vs. Palo Alto Networks: Which Is...

Fortinet and Palo Alto Networks hold a significant corner of the enterprise network security market, with extensive cybersecurity portfolios that cover more than just...

Netskope: Cybersecurity Portfolio Review

Netskope is an American provider of software solutions and security platforms. It offers a wide variety of cloud-native solutions for data protection in cloud...

How Endpoint Protection is Used by Finastra,...

Endpoint protection is a type of cybersecurity practice and software solution that focuses on guarding the entry points of networks. This keeps them safe...

How Antimalware is Used by Meyer Tool,...

Antimalware software solutions work by protecting IT systems and infrastructures, networks, and individual users from malware. Since malware can come from outside the networks, online...

How IAM is Used by Whole Foods,...

Identity access and management (IAM) is a policy framework that ensures users have sufficient access to technical resources.  IAM solutions are used by companies that...

Top Endpoint Protection Trends for 2022

Threat actors continue to exploit vulnerabilities across endpoints and cloud environments. The bad guys are ramping up their efforts. Not only are they raising...

Top Antimalware Trends in 2022

Malware is more potent than ever. No longer does it just corrupt some files. It infiltrates entire businesses, locks users out of systems, demands...

NetApp and Cisco Partnering on Converged Infrastructure...

SUNNYVALE, Calif. — The storage company NetApp and Cisco are introducing a joint converged infrastructure offering for hybrid cloud environments. NetApp and Cisco are rolling...

NetApp Acquires Fylamynt for CloudOps

SAN JOSE, Calif.  — The data storage company NetApp is expanding its CloudOps portfolio by acquiring venture capital-backed Fylamynt. NetApp acquired Fylamynt for its CloudOps...

Hitachi Vantara Launches Cloud Application Reliability Centers

SANTA CLARA, Calif. — The data storage company Hitachi Vantara is introducing “centers of excellence” and a set of services to help enterprises manage...

CyArk Migrates Unstructured Data With Seagate

FREMONT, Calif. — CyArk is working with the data storage company Seagate to manage CyArk's archives of data on cultural heritage.  CyArk implemented Seagate’s storage-as-a-service...

Latest Articles

15 Software Defined Storage Best Practices

Software Defined Storage (SDS) enables the use of commodity storage hardware. Learn 15 best practices for SDS implementation.

What is Fibre Channel over Ethernet (FCoE)?

Fibre Channel Over Ethernet (FCoE) is the encapsulation and transmission of Fibre Channel (FC) frames over enhanced Ethernet networks, combining the advantages of Ethernet...

9 Types of Computer Memory Defined (With Use Cases)

Computer memory is a term for all of the types of data storage technology that a computer may use. Learn more about the X types of computer memory.
- Advertisement -