Stream Data Centers, a data center developer specializing in secure, independent, highly efficient Private Data Centers for corporate users, has started construction of a fully-commissioned Private Data Center development in The Woodlands, Texas, a master-planned community 35 miles north of downtown Houston.
One of the quickest ways to double your security business and get better quality clientele is to have systems in place that put your clients to work for you—systems that generate referrals.
- By Bob Maunsell
- Jan 01, 2012
A Hungarian citizen pleaded guilty today to intentionally causing damage by transmitting a malicious code to Marriott International Corporation computers and to threatening to reveal confidential information obtained from the company’s computers if Marriott did not offer him a job.
IBM is unveiling a new service to help businesses secure the exploding number of mobile devices with access to corporate data.
Whether you’re a brand-new alarm dealer starting a company or an established dealer looking to expand through acquisitions, opportunities for financing abound.
- By Cindy Horbrook
- Oct 01, 2011
Mimecast, supplier of cloud-based email archiving, continuity and security for Microsoft Exchange and Office 365, recently announced its new email archiving service for BlackBerry smartphones.
A group of Microsoft researchers announced recently that they had cracked a version of the Advanced Encryption Standard (AES), the world’s toughest encryption mechanism.
- By Laura Williams
- Aug 29, 2011
While the world is distracted with the continuing reports of phone hacking practices and other corporate data breaches,a new survey reveals that hundreds of organizations are now vulnerable to internal threats.
Exercising its large-scale security integration capabilities, Diebold, Inc. is managing the installation, integration and maintenance of a complex security software system for the new World Trade Center (WTC) site in New York City.
A year after initial Unisys Corporation research showed that enterprise IT departments were unprepared for the rapidly growing usage of consumer technologies in the workplace, a Unisys-sponsored follow-on study reveals that this "consumerization gap" may be widening.
Crime never gets old, and old crime neverseems to go away. If there is a will, there will always be a way for bad actors to steal money,or in this case, steal an identity. Card skimming has resurfaced as a thief’s easy mark.
- By Ralph C. Jensen
- Jul 01, 2011
An excellent starting point for an organization looking at cloud computing platforms is to examine its IT architecture. Only by aligning the architecture – compute, network, data center, power and storage resources – with applications can a company be on the path to achieve the reliability and performance it requires within a cloud environment.
The combination of Cyveillance’s Cyber Safety Awareness Training and Wombat’s PhishGuru Testing via simulated attacks provides a unique assessment and employee education.
The product consists of a client and "mobility server" component that enables persistent content protection for the iPhone and iPad equivalent to that provided by GigaTrust for the BlackBerry smartphone and Windows Desktop.
Power solutions provider Alpha Technologies Ltd. has introduced the new FXM 350 and Micro 350 uninterruptible power supply products.
KineticD has completed its acquisition of ROBOBAK, which provides hybrid-cloud backup software for MSPs and the remote offices/branch offices (ROBO) of small enterprises.
The company's growing channel efforts helped the company achieve record revenue growth in 2010, increasing revenues by 115 percent over 2009 and more than tripling its customer base of Fortune 500 customers.
HID Global has extended its HID Identity on Demand services to include a secure Web portal that enables customers and channel partners to monitor and manage all aspects of card personalization projects, including design, ordering, data transmission, printing, programming and delivery.
Passware Inc. has announced that its Passware Kit Forensic is the first commercial software to use the power of cloud computing to accelerate password recovery.
The companies will be presenting at the Datacenter Dynamics conference and Expo on March 10 in New York City on intelligent infrastructure investment.