Industry News

Cloud, Compliance and Data Protection Top Storage Priorities for 2016

Cloud, Compliance and Data Protection Top Storage Priorities for 2016

July 19th, 2016

Cloud storage appliances: What they are and who provides them? Spend on the cloud seems to be set to eclipse in-house hardware and software in 2016. When asked which areas would see increases in IT...

Choosing The Right Cloud Provider For Your Business:

Choosing The Right Cloud Provider For Your Business:

April 18th, 2016

Looking at business yesterday vs. business today, one of the biggest differences is speed. Business moves faster today. Business cycles, market opportunities (and challenges), product lifespans—th...

Data Privacy In The Cloud

Data Privacy In The Cloud

March 29th, 2016

DATA PRIVACY IN THE CLOUD  INTRODUCTION The collection of technologies known as cloud computing have created revolutionary change in the way people around the world live and work. The ‘cloud effec...

2016 Security Predictions

2016 Security Predictions

March 4th, 2016

Thought leaders within the IT community are beginning to view cybersecurity not just as part and parcel of the everyday cost of doing business, but as an enabler, a direct driver of business continuit...

Storage Appliance Solutions For Cloud-Based Data Protection

Storage Appliance Solutions For Cloud-Based Data Protection

January 6th, 2016

Data Protection Appliances: For When Cloud-Based Data Protection Software Isn't Enough. Software that takes advantage of the capacity and flexibility of public or private clouds is an important...

The Hybrid Cloud: A PRAGMATIC VIEW OF ARCHITECTURES

The Hybrid Cloud: A PRAGMATIC VIEW OF ARCHITECTURES

September 7th, 2015

Introduction: PRAGMATISM RULES Is the future of computing in the cloud? Increasingly, it appears headed in that direction – and for good reason. Cloud computing presents numerous cost, agility, and...

Best Practice Security in a Cloud-Enabled World

Best Practice Security in a Cloud-Enabled World

August 28th, 2015

Introduction The cloud will be a growing part of your IT environment. This is inevitable, particularly in consideration of the following: ▪ Economic Attractiveness – The economic attractiveness ...

UK Cloud Adoption Trends For 2015

UK Cloud Adoption Trends For 2015

August 28th, 2015

This Executive Brief is a summary of the white paper: The Normalisation of Cloud in a Hybrid IT Market UK Cloud Adoption Snapshot & Trends for 2015 DEFINITION • Hybrid IT is an approach t...

Achieving a Hybrid Cloud Balance for Business - Critical Workloads

Achieving a Hybrid Cloud Balance for Business - Critical Workloads

August 21st, 2015

A growing number of enterprises are adopting both private and public cloud computing models. While virtualization, cloud, mobility, data analytics, and the Internet of Things (IoT) are providing treme...

The Global Risk 2015 Report

The Global Risk 2015 Report

June 5th, 2015

The Global Risk Report 2015 Global Risks 2015, 10th Edition is published by the World Economic Forum within the framework of The Global Competitiveness and Benchmarking Network. The information ...

State of Partnering Study Driving Cloud Transitions 2015

State of Partnering Study Driving Cloud Transitions 2015

May 26th, 2015

Are your channels cloud-ready? We have all seen the data for several years. End customers are continuing to adopt on-demand consumption models, driving an increased IT market opportunity. IDC indica...

Global Study: Hybrid Cloud – From Hype to Reality

Global Study: Hybrid Cloud – From Hype to Reality

May 18th, 2015

Executive summary Technology has gained critical mass in enterprises in several ways. Historically the IT department, with clear orders and budget from the CIO, would buy, deploy and strictly control...

TechTarget 2015 IT Priorities Study

TechTarget 2015 IT Priorities Study

May 8th, 2015

TechTarget and Computer Weekly surveyed IT professionals globally to find out their IT priorities and forecasts for 2015. Find out what European businesses are forecasting for IT budgets, new initiati...

Private Cloud Solutions Review

Private Cloud Solutions Review

April 7th, 2015

The Forrester Wave™: Private Cloud Solutions, Q4 2013 by Lauren E. Nelson, November 25, 2013 Key Takeaways Private Cloud Tools Are Rapidly Evolving To Meet A Range Of Enterprise Requirements Ent...

The Fusion of Business and IT

The Fusion of Business and IT

March 27th, 2015

We have it on good authority that the constant in life is change. Yet, given the magnitude of the change we witness daily and the staggering pace at which it now unfolds, the term “constant” seems ina...

Driving Cloud Transitions - State of Partnering

Driving Cloud Transitions - State of Partnering

March 18th, 2015

Introduction: Are your channels cloud-ready? We have all seen the data for several years. End customers are continuing to adopt on-demand consumption models, driving an increased IT market opportunit...

Ovum Decision Matrix: Selecting an Enterprise Backup and Recovery Solution, 2014–2015

Ovum Decision Matrix: Selecting an Enterprise Backup and Recovery Solution, 2014–2015

March 5th, 2015

Summary: Catalyst: Organizations are demanding higher levels of system and network availability, and cost effective business continuity. However, all this must be managed and maintained by a single d...

2014 Global Report on the Cost of Cyber Crime

2014 Global Report on the Cost of Cyber Crime

February 22nd, 2015

Benchmark Study of Global Companies - Ponemon Institute October 2014 Part 1. Executive Summary We are pleased to present the 2014 Global Report on the Cost of Cyber Crime. Sponsored by HP Enterpris...

Cloud Spectator | IaaS Industry Pricing Comparison

Cloud Spectator | IaaS Industry Pricing Comparison

January 21st, 2015

Executive Summary The cloud infrastructure industry is changing constantly. As the Infrastructure as a Service (IaaS) market gets increasingly competitive, price changes are common. For example, Amaz...

Online Security - Beyond Malware and Antivirus

Online Security - Beyond Malware and Antivirus

January 12th, 2015

Abstract Security has always encompassed physical and logical components. But in the face of Bring Your Own Device (BYOD), an increasingly mobile and remote workforce, highly distributed assets and s...