Saturday, May 17, 2025

Videos

Microsoft Azure + Barracuda security solutions: An overview

Corey Sanders, Director of Program Management for Azure at Microsoft, gives an overview of how to leverage Barracuda and Azure solutions together. Sanders shared, "Most customers are looking for (security)...

Barracuda Expands Cloud-Ready Next-Generation Firewall Technology

Next-Generation Security for the Cloud Era. This 1-minute video provides a snapshot review of the IT landscape, including requirements for operating secure, distributed, cloud-based...

Cisco Chairman John Chambers on Dell-EMC “strategic merger”

At Internet of Things World Forum in Dubai, UAE, Cisco Chairman John Chambers answers EITN's question about his view of Dell acquiring EMC. He diplomatically...

Windows 10: The end of a computing security paradigm?

Mobile Iron CEO Bob Tinker talks to Enterprise IT News about the new security architecture model that will begin to pervade the computing industry,...

RSA APJ 2015 kick off in Singapore

RSA® Conference, the world’s leading information security conference and exposition, returned to Marina Bay Sands in Singapore, from 22 – 24 July, for the...

Moving to the cloud in three steps

By Subra Suppiah, Country Manager, Avanade Malaysia Ah, the cloud. Everyone is doing it. Everyone is talking about it. While writing this blog post, I...

The hacker’s guide to online reputation management

What's the worth of your name and reputation?Reputation can make or break any company or individual; one blistering review that surfaces on the...

Think Flat with Ethernet Fabric

Importance of a Flat Network Architecture in Cloud Implementation Executive Summary As adoption of server virtualization gains momentum, many customers...

The Generation Gap: Upgrading Data Storage Systems Efficiently and Effectively

Due to the massive data growth of in the coming years, many businesses’ existing storage applications have been identified as insufficient to technically support...

Test Report: Anti-Malware solutions for Android

The Smartphone market grew enormously over the last five years and the mobile malware evolved rapidly, too. Right now there are over 450.000 apps...

In the Battle against Cyber Attackers, Information Superiority Wins

By Ivan Wen (Country Manager, Sourcefire Malaysia). Whether we’re engaging foes in warfare or protecting our computer networks, having information superiority is essential to...