Oracle outlines generational shift to the cloud
SAN FRANCISCO – There’s a feeling of déjà vu permeating the keynotes at this year’s Oracle OpenWorld — the company…
Refers to the software and hardware employed in securing information technology data and systems from intrusion and attack. This can range from end-point or perimeter security to data centre protection, sometimes delivered by appliance, as well as access control and application-level security.
SAN FRANCISCO – There’s a feeling of déjà vu permeating the keynotes at this year’s Oracle OpenWorld — the company…
Chief information security officers (CISO) who have bought McAfee solutions and channel partners that sell them won’t…
LAS VEGAS – One of the big questions coming out of the Dell Peak Conference is if…
LAS VEGAS – SonicWALL Peak Performance has been a highlight of my conference schedule for many years. …
LAS VEGAS – Judging from the roughly 750 channel partners from more than 20 countries who are…
Palo Alto Networks has hired Dave Peranich to lead its worldwide sales and channel efforts. Peranich takes over…
Enterprises that don’t want to pony up the cash to pay for a suitably-sized security staff may find…
Cisco Systems Inc. will trim more than 5,500 jobs from its workforce is a sign it is in…
LAS VEGAS – On Day 2 of Cisco Live, the vendor focused on the issue of security,…
TORONTO – “As soon as you print your document it no longer becomes intelligent.” That’s what Julia…
Symantec Corp. hopes to educate the alarming number of Canadians unaware of the risks involved in using…
In part one of CDN’s exclusive interview with HP Canada Co. country manager Mary Ann Yule, the former CDW…
TORONTO – One of the big four mega trends is Big Data or put in other terms…
While Windows-based PCs comprise the overwhelming majority of desktop devices owned by enterprises, a number of OS…
Update: Thanks again to Nandini Jolly of CryptoMill Technologies Inc. and Laura Tribe of Open Media, and…