Unitrends, the leading provider of all-in-one backup, archiving, instant recovery and disaster recovery solutions, today announced that the company experienced double digit revenue growth in 2012 -- the best year in the company's 24-year history.
As enterprises make mission-critical data available to employees, they also must consider legal and compliance regulations in their respective industries. Many organizations are required by law to be in compliance with data protection standards. CMS’s new CE Secure DiskVault USB 3.0 helps ensure that companies meet regulations such as HIPAA, Sarbanes-Oxley and more.
In 2013 the cloud will continue to forge a massive convergence of technologies -- similar to the evolution of the cell phone to the smart phone. "The lines between platform as a service (PaaS) and cloud services brokerages will blur into a conceptual operating system for the 'Web as a platform'."
Tuesday's report by ISNA quotes provincial civil defense chief Ali Akbar Akhavan as saying the virus targeted a power plant and some other industries in Hormozgan province in recent months. Akhavan says Iranian computer experts were able to "successfully stop" the worm.
State officials say the personal information of more than 92,000 Missourians was accessed by potential identity thieves who hacked the computer systems of Nationwide Insurance, which also does business as Allied Insurance. Missouri's insurance director says the breach affected the records of people who got quotes for auto insurance after August 2011.
Dell is introducing a mobile management solution that helps organizations secure and simplify BYOD, a security portal to help organizations monitor network security threats, and a data recovery appliance to ensure organizations stay up and running amid unexpected outages.
EVault, Inc., a Seagate Company (NASDAQ: STX), today announced a partnership with Fujitsu. The strategic partnership enables Fujitsu to expand and enhance its backup and recovery portfolio by bringing to market a series of comprehensive hybrid cloud services.
The social networking site with over 1 billion users worldwide says on Monday it made a change to its domain name system setup. The change resulted in some users temporarily not being able to reach the site. The problem was detected and the site is now fully back.
Violent acts of terrorism will be less frequent as the U.S. drawdown in troops from Iraq and Afghanistan robs extremist ideologies of a rallying cry to spur attacks. But that will likely be replaced by acts like cyber-terrorism, wreaking havoc on an economy with a keystroke.
Pravail APS protects enterprises that rely on Internet availability, securing business continuity and availability by automatically neutralizing application-layer DDoS attacks before they impact critical services. Arbor's Peakflow SP Threat Management System provides up to 40Gbps mitigation capacity.
The combination of Rentsys Recovery’s business continuity expertise and Williams Scotsman’s 60 years of modular space experience will create the largest site recovery solution in the United States, with dedicated support staff complementing the widely dispersed fleet of temporary modular workspaces.
The International Atomic Energy Agency acknowledged Tuesday that one of its servers had been hacked after a previously unknown group critical of Israel's undeclared nuclear weapons program posted contact details for more than 100 experts working for the U.N. nuclear watchdog.
The computer security firm hired to investigate the breach showed the revenue department's system was vulnerable because it did not require dual verification for someone trying to access tax returns and did not encrypt Social Security numbers.
The acquisition allows OSN to add business continuity and disaster recovery capabilities, as well as managed hosting and storage to its growing portfolio. These products are particularly significant at present when enterprises are focused on both strategic allocation of IT investments and safeguarding of mission-critical company information.
NaviSite's NaviCloud Platform has been designed to address the critical IT issues confronting organizations, such as cost, agility, reliability and business continuity. The new cloud node is designed to expand the company's cloud capabilities and fulfill the growth and needs of their customers.
Cyber security experts said that such hacking attempts have become a new aspect of modern-day warfare and states have to invest in fortifying their virtual defenses on a battleground with vague terrain. Israel regularly fights off hundreds of hacking attempts every day, but nothing on the scale of the recent torrent of attacks.
Opengear announced that its ACM5500 family of Remote Infrastructure Management (RIM) Gateways has been extended to include a new member with an integrated wireless access point. The ACM5504-5-G-W-I offers integrated cellular, wired and wireless access, allowing IT managers a range of connectivity options to easily manage critical infrastructure at local and remote sites.
The 2013 Continuity Insights Management Conference, running April 22-24 at the Sheraton San Diego Hotel and Marina, comprises three days of comprehensive educational programming, numerous networking opportunities, a review of the latest technologies, products and services--plus a special evening reception at the world famous San Diego Zoo. It is truly the industry's leading gathering of subject-matter experts.
The former Republican senator claims the company hired by the Revenue Department for computer security failed to protect taxpayers' data. Trustwave has "violated and failed to comply with the duties imposed upon them to encrypt data and to expeditiously disclose the breach of security," the lawsuit reads.
Several NBC websites were hacked on Sunday by a person or group calling itself "pyknic" and suggesting a possible link to the cyber-attack group Anonymous. It appeared that the "defacement" of the affected sub-sites was cleaned up in a couple hours.
December 4, 2012 at 2:00 p.m. EDTIn today’s data-intensive business environment, you can’t afford to have your systems down for 24 hours or more. Sometimes, even four hours is too long. RTOs are shortening and service level agreements (SLAs) are keeping pace.In this live webcast you will learn:Industry trends in backup and recovery timesThe importance of a guaranteed SLA for disaster recoveryArchitecture options to ensure data protection and uninterrupted operationsREGISTER TODAY
State and federal officials say an international hacker broke into the South Carolina Department of Revenue computer files and gained access to about 3.6 million tax returns. Gov. Nikki Haley said the hacked files included state returns submitted since 1998 with unencrypted Social Security numbers.
Zetta.net today announced a special data evacuation service offer for businesses in the areas affected by Hurricane Sandy. Critical data can be immediately evacuated to geographically dispersed, enterprise-grade data centers for free, where it will be securely preserved throughout the course of the storm.
Flooded data centers in downtown Manhattan brought down Gawker, Huffington Post and many popular New York-based blogs Tuesday while phone and cable companies were scrambling to assess damage and restore service in the aftermath of Hurricane Sandy.
IO will provide BSSP with Data Center as a Service (DCaaST) delivered out of the IO Phoenix data center. Organizations can use IO DCaaS to support cloud computing, big data, high-availability applications, business continuity/disaster recovery, data center consolidation and other strategic technology initiatives.