Blog

The DDoS Attack Threat: Is Your Network at Risk?

Distributed Denial of Service (DDoS) attacks are on the rise. In its Q4 2014 State of the Internet Security Report, Akamai reported that the number of DDoS attacks almost doubled compared to the fourth quarter of 2013, and the average

You’ve Identified Vulnerabilities in Your Network. Now What?

In a previous post, we discussed why vulnerability assessments are critical to network security. A vulnerability assessment can detect weaknesses that are missed by network security systems, which is why vulnerability assessments are now required for regulatory compliance in a

How to Get Vulnerability Assessments Right

In a previous post, we discussed how the latest Payment Card Industry Data Security Standard, known as PCI 3.0, is a prime example of how regulatory compliance has become a primary driver for vulnerability assessments. Despite more stringent regulations in

Why Regular Vulnerability Assessments Are a Critical Part of Security

In 2013, the Payment Card Industry Security Standards Council (PCI SSC) introduced PCI 3.0, the latest version of the PCI Data Security Standard. A core driver behind PCI 3.0 is the desire to increase PCI compliance among retailers by making

Is It Time for a Network Refresh?

Sequel-network-refresh

Network bandwidth requirements are increasing rapidly. On average, bandwidth consumption doubles every 10 months. Data volumes in the data center double every 18 months. The number of devices accessing the network doubles every 30 months. Is your network infrastructure built

IP Video Surveillance: Is Your Storage Infrastructure Ready?

As we discussed in our previous post, demand for IP video surveillance is increasing rapidly, as organizations seek to protect against a wide range of physical threats. IP video surveillance also has a number of non-security purposes, including accident and

The Benefits of IP Video Surveillance

The demand for more advanced video surveillance is on the rise as organizations seek to protect people, infrastructure and information from deliberate and accidental threats. According to a new report by MarketsandMarkets, the global video surveillance market is estimated to

How HP StoreOnce Simplifies Enterprise Backup

Just like the IT infrastructure of many enterprises has gradually evolved and grown piece by piece, so have the backup solutions in these environments. Physical desktops, virtual desktops and remote workers could conceivably be using different backup applications. Because each

How HP Is Improving Converged Infrastructure

At the recent HP Discover conference in Barcelona, HP introduced a number of new enterprise products and services to meet the growing demands organizations are placing on their data centers. Included in this announcement were several converged infrastructure and hyper-convergence

How Virtual Desktops Support Employee-Centric Environments

Employees armed with a variety of mobile and desktop devices now prefer to choose not only the devices they use at work, but the applications and operating systems. In an effort to create a more employee-centric environment, organizations have instituted