Blogs

View All RSS Feed

Last Updated on 25 July 2014, Total: 1130 Blog Posts

526 George Chetcuti’s Blog 25 July 2014
604 Windows Networking Admin Blog 6 June 2014
  1. How do you address targeted attacks?

    TrendLabs Security Intelligence Blog published a short but very informative post on how IT administrators should strategize against targeted attacks... Read More

  2. Unitrends Launches Free Online Disaster Recovery Planning Tool

    Industry-first offering saves companies countless hours and thousands of dollars... Read More

  3. Microsoft is integrating the cloud into the Microsoft Partner Network

    The announcement was made Monday by Phil Sorgen, Microsoft corporate vice president, Worldwide Partner Channel, at the Worldwide Partner Conference 2014 in Washington, D.C... Read More

  4. EFS is only as strong as your login password

    If you think that your sensitive and most important files are adequately protected when stored in an encrypted folder on your hard drive then you’re wrong!... Read More

  5. GFI Software Adds File Archiving and Increased Functionality through Outlook in GFI MailArchiver 2014

    Survey Data Shows More Work Than Ever Is Being Conducted Remotely. New File Archiving Feature Keeps Company Documents Safely Out of Public Clouds... Read More

  6. Unitrends Sets New Standard for Virtual Backup and Recovery

    Unitrends Virtual Backup 8.0 simplifies data protection for vSphere, XenServer and Hyper-V and boosts backup performance for half the TCO of competing products... Read More

  7. Microsoft acquires InMage

    InMage is an innovator in the emerging area of cloud-based business continuity... Read More

  8. Do you have an email archive migration strategy?

    "Migrating archives is not a trivial undertaking," reads an Osterman Research report on the subject... Read More

  9. CEE Storage Vendors Struggle with Major Economic Challenges in Q1 2014

    IDC's Disk Storage Systems Quarterly Tracker delivers timely intelligence and a comprehensive database detailing changes and trends in the storage market. The tracker enables users to view data by volume, value, terabytes, country, year, quarter, vendor, product brand, model name, product category, topology, installation, protocol, OS, redundancy, storage class, and price band... Read More

  10. Stealthy IM tool for absolute privacy

    Security experts have teamed up to make absolute privacy from mass surveillance the default practice... Read More

Featured Links