Monthly Archives: October 2015

In today’s heterogeneous computing environment, deploying applications across a wide variety of hardware has proven to be a time- and labor-intensive process. Depending upon where the app is running — whether on bare-metal or virtualized servers in public, private or hybrid clouds — it can have wildly different operating system, security, storage and network requirements.…

Read More

Despite growing use of network behavior analysis techniques, IT security remains largely reactive. Security vendors and researchers must obtain a sample of an exploit in order to detect and block attacks that have already occurred. Threat intelligence improves on these techniques by analyzing many sources of information to provide actionable information on emerging threats. It…

Read More