Blog Post

Take Control of Your Cloud Automation Strategy with IIS and Red Hat

How are you leveraging the cloud in your organization?  With today’s fast-moving, ever changing compute landscape, it can be hard to substantiate the impact that cloud computing is having on your environment.  The benefits of transitioning to the cloud are different in every situation.  In your environment the benefit may be the ability to...

Read more >

Blog Post

Ransom Threat Prevention

Octavio Diaz
February 19, 2016

Ransomware is becoming more pervasive.  Ransomware is a generic term for a family of viruses and malware that encrypts the user’s data and holds it hostage until a payment is made.  Variants include CryptoWall, Cryptotolocker, Power Worm, KnowBe4 and many others.

This type of attack is typically delivered...

Read more >

Blog Post

Webinar: Cloud Transformation in 2016. What are the key trends?

Cloud is rapidly entering an entirely new phase, one destined to prove far more transformative and disruptive than the initial phase of cloud computing. It is driving comprehensive transformation of digital assets in organizations of all stripes as IT decision makers begin to view this emerging cloud construct as a proxy for digital...

Read more >

Blog Post

HP StoreOnce: Protecting Server Data with HP StoreOnce Catalyst and HP Data Protector

You never want to have to think about data protection. Either you’ve lost data, or you’re wondering if you could save time by training a monkey to back it up.

Don’t lose data, and don’t waste time backing it up manually. HP StoreOnce and HP Data Protector replicates and deduplicates with less disk space and better performance for your...

Read more >