by Andrew Braunberg | Jan 31, 2014 | Blog
Lenovo has agreed to acquire Motorola Mobility from Google for USD $2.91 billion. This comes as a bit of a shock because in 2011, Google acquired Motorola Mobility for USD $12.5 billion. It’s not surprising that Google has decided to divest itself of the handset...
by Andrew Braunberg | Jan 31, 2014 | Blog
VMware is a company with a rich history. Founded in 1998, it has done as much as any firm in promoting and furthering server virtualization and a radical rethinking of enterprise data centers. The company was a pioneer in virtualization and policy-driven automation...
by Chris Morales | Jan 23, 2014 | Blog
If the marketing hype is true, the world soon will be software defined. Hardware will become the lowest common denominator with no real relationship to the systems and applications (apps) it hosts other than offering processing cycles for the needed task. So, if this...
by Andrew Braunberg | Jan 23, 2014 | Blog
It occurred to enterprise information technology (IT) and security teams rather quickly that if they were to be forced to allow employee-owned, consumer-grade mobile devices on their corporate networks, it would be beneficial to have the capability to segregate...
by Rob Ayoub | Jan 21, 2014 | Blog
If I told you there was a business model that would sell more of your product, generate monthly recurring revenue, and increase customer loyalty, what would you say? Would I be labeled as crazy? What’s the catch? Value added resellers (VARs) take heed: managed...
by NSS Labs | Jan 15, 2014 | Press
5 of 10 Intrusion Prevention Systems Tested Received NSS Labs Coveted “Recommended” Status AUSTIN, Texas – January 15, 2014 – NSS Labs today released its 2013 Network Intrusion Prevention Systems (IPS) Security Value Map™ and Comparative Analysis Reports, which...
by Ken Baylor | Jan 15, 2014 | Blog
FireEye’s acquisition of Mandiant this month stunned many. Some believed two bottles of Kool-Aid merged, while others see the formation of a potential challenger to established security players. Yet others believe this to be the acquisition of an overpriced toy by a...
by Ken Baylor | Jan 9, 2014 | Blog
Whether you lived near moving water in Medieval Russia, were moored in the Highlands of Scotland, or lived in a huge tower in Ireland, you knew when the Vikings had landed. Within moments, everything you owned had been stolen, killed, or set on fire. Those who...
by Chris Morales | Jan 7, 2014 | Blog
The problem with next-generation information security technology is that it is predicated on last-generation enterprise architecture. In many instances, the best new security options are no more than minor iterations from existing technology. Even though the...
Recent Comments