By Vic Nyman “Cloud Computing!”  Is it the savior of IT or the bane of our existence?  Cloud computing has extreme potential, especially for achieving operational efficiencies and cost savings.  Unfortunately, with that potential is the potential for business disaster – outages in places you can’t control impacting customer satisfaction or even sales results.  Imagine…

SMEs are increasingly dominating the market for security applications. New threats and BYOD let companies invest in their security. The turnover in the market for security software is therefore grown last year by about eight percent. Gartner reported the turnover of the global market for security software grew last year by 7.9 percent to $19.2…

The Open Data Center Alliance (ODCA) is developing a unified vision for cloud requirements – particularly focused on open, interoperable solutions for secure cloud federation, automation of cloud infrastructure, common management, and transparency of cloud service delivery. As in previous years, CloudTimes is proud to announce to be a media partner for this year’s Forecast conference. ODCA’s…

by Erik Grueter What if your software could detect when it was under attack? What if files reported when, where and by whom they were opened? Intelligent digital assets are behind an agile new security style called Information Based Security.  Developed in response to an increased use of file sharing services, personal devices, and niche business applications….

Now that cloud computing technology has already gone past the infancy stages, many industries have already realized the benefits it provides, and have already started adopting and integrating the technology to their businesses. One key sector that stands to benefit a lot from the cloud is marketing, as it has the ability to drastically change…

Cyberwar fundamentally changes how government must handle security. Faced with increasingly sophisticated attacks from gangs of cyber criminals and foreign governments probing systems for sensitive data, threats frequently go undetected for days, weeks, and even months. And it’s not just financial data being stolen. Terrorists and rogue governments may steal confidential data, including intelligence information,…

For those who follow the latest technology news, it is very common to read “BYOD” or Bring-Your-Own Device. The term has become popular due to the proliferation of mini-laptops, tables, and smartphones in the market today. Business owners are even mulling the idea of implementing their own Bring-Your-Own Device policy because a lot of people…

The US Department of Defense had recently announced that it plans to provide its employees with mobile devices, computer tablets, as well as smartphones for them to be able to share protected and classified data quickly. With the latest mobile technologies, the military will be equipped with the necessary secured devices. Due to this announcement,…