- May 14, 2009
While it could save money, many firms should understand the security, privacy and legal issues when using cloud-based services.
- April 29, 2009
Trend Micro said Third Brigade's technology bolsters its datacenter security strategy by helping its customers protect virtual servers and cloud computing initiatives.
- April 23, 2009
Experts and vendors make the case for the security attributes of thin and robust hypervisors, but rapid changes in virtualization technology could further complicate the virtualization security debate.
- April 22, 2009
The non-profit Cloud Security Alliance says its comprehensive report serves as the starting point for a broader discussion on cloud computing security issues.
- April 21, 2009
Troy Leach, technical director for the Payment Card Industry Security Standards Council recognizes a gap in the standard when it comes to addressing the security of payment card data in cloud computing and virtualized environments. In an interview,...
Sponsored by CloudHealth - As enterprises continue to add new use cases and workloads to their cloud portfolio, the stakes keep rising for potential governance speed bumps. Business users and IT professionals alike are now using the cloud for everything from compliance and security to cloud-native application development and infrastructure optimization. But this makes policy management more difficult, time consuming and costly, especially with so many cloud services being purchased and deployed outside the scope, visibility and control of a centralized IT operations group. See More
Sponsored by IBM - Now is the time to fully embrace SAP modernization. There is simply too much value in the data contained within SAP applications for any enterprise to risk missing out on potential digital transformation opportunities. See More
Sponsored by IBM - Every enterprise has dozens, hundreds, or even thousands of applications developed through traditional methodologies. Whether those applications were created by internal developers or purchased off the shelf from software publishers, it’s highly likely they were built and deployed using tools and processes that have been around for years. See More
Sponsored by IBM - Enterprise IT decision-makers predict that more than 40% of their workloads will be running on public cloud platforms by 2020. The question is not whether to move apps to the public cloud; it is more about which apps to move and how to move them without risk. See More
- April 21, 2009
With the release, the virtualization powerhouse will now enable third-party security vendors to apply security within the hypervisor to safeguard virtual machines at the host level.
- April 17, 2009
Cloud computing is changing the way we do business; the scalability, flexibility and cost savings are seductive, even irresistible. But, as with every "next big thing" in technology, security is a potential stumbling point. The distributed computing...
- April 15, 2009
The Cloud Security Alliance will need to sharpen its focus if it expects to contribute useful information and foster a discussion around security in the cloud.
- September 15, 2008
Total Protection for Virtualization is a suite of products that includes a component that scans offline virtual images for configuration and security vulnerabilities.
- August 19, 2008
Indianapolis-based BlueLock LLC uses Check Point's virtual firewall appliance to secure its VMware infrastructure.