Key commissioned an experienced market survey organization to find the answers to ten central questions regarding how US organizations are combating security threats to their data and networks. The final report, Key’s 2008 User Survey: Trends in Data & Network Security, will be available in August.

The enterprise information technology (IT) landscape is populated with opportunities and challenges. For decades, server and storage solutions have been the engines powering a multitude of business efficiencies and company profits. More importantly, as these solutions continue to evolve, they offer organizations an ever-growing number of technological means to achieve new ends. But even as enterprise technologies improve within, […]

Modern CPUs from both Intel and AMD contain a hardware execution layer called a hypervisor. The hypervisor is a hardware speedup mechanism what allows modern-day virtualization software to operate at very near stand-alone speeds, as if it were only running one OS at any given time.

The question is asked by Senior Reporter from Forbes Andy Greenberg, who attended the security industry’s big annual confab, the RSA Conference, and wrote up an article aptly titled ‘Virtualization Dark’s Side‘.

For years, many companies have been faced with challenges related to providing backup and recovery for infrastructures, technologies and networks in order to protect their critical business processing capabilities. Much of this effort has been driven by the need to provide a recovery design that was cost-effective and leveraged as much of the information technology […]

Guest “break-out” attacks — where the bad guys break out of a guest virtual machine to attack the hypervisor and gain control of the host — are a looming threat, according to David M. Lynch, vice president of marketing at Embotics. “The only question is, when, not if, a viable attack will occur.”

Key Information Systems to Present Security Webinar:
Data Leakage – Combating Your Biggest IT Security Threat