Videos
Microsoft Azure + Barracuda security solutions: An overview
Corey Sanders, Director of Program Management for Azure at Microsoft, gives an overview of how to leverage Barracuda and Azure solutions together.
Sanders shared, "Most customers are looking for (security)...
Latest
Barracuda Expands Cloud-Ready Next-Generation Firewall Technology
Next-Generation Security for the Cloud Era. This 1-minute video provides a snapshot review of the IT landscape, including requirements for operating secure, distributed, cloud-based...
On The Beat
Cisco Chairman John Chambers on Dell-EMC “strategic merger”
At Internet of Things World Forum in Dubai, UAE, Cisco Chairman John Chambers answers EITN's question about his view of Dell acquiring EMC.
He diplomatically...
Videos
Windows 10: The end of a computing security paradigm?
Mobile Iron CEO Bob Tinker talks to Enterprise IT News about the new security architecture model that will begin to pervade the computing industry,...
Videos
RSA APJ 2015 kick off in Singapore
RSA® Conference, the world’s leading information security conference and exposition, returned to Marina Bay Sands in Singapore, from 22 – 24 July, for the...
Videos
Moving to the cloud in three steps
By Subra Suppiah, Country Manager, Avanade Malaysia
Ah, the cloud. Everyone is doing it. Everyone is talking about it. While writing this blog post, I...
Videos
The hacker’s guide to online reputation management
What's the worth of your name and reputation?Reputation can make or break any company or individual; one blistering review that surfaces on the...
Videos
Think Flat with Ethernet Fabric
Importance of a Flat Network Architecture in Cloud Implementation Executive Summary As adoption of server virtualization gains momentum, many customers...
Videos
The Generation Gap: Upgrading Data Storage Systems Efficiently and Effectively
Due to the massive data growth of in the coming years, many businesses’ existing storage applications have been identified as insufficient to technically support...
Videos
Test Report: Anti-Malware solutions for Android
The Smartphone market grew enormously over the last five years and the mobile malware evolved rapidly, too. Right now there are over 450.000 apps...
Videos
In the Battle against Cyber Attackers, Information Superiority Wins
By Ivan Wen (Country Manager, Sourcefire Malaysia). Whether we’re engaging foes in warfare or protecting our computer networks, having information superiority is essential to...