The question is asked by Senior Reporter from Forbes Andy Greenberg, who attended the security industry’s big annual confab, the RSA Conference, and wrote up an article aptly titled ‘Virtualization Dark’s Side‘.
For years, many companies have been faced with challenges related to providing backup and recovery for infrastructures, technologies and networks in order to protect their critical business processing capabilities. Much of this effort has been driven by the need to provide a recovery design that was cost-effective and leveraged as much of the information technology […]
Guest “break-out” attacks — where the bad guys break out of a guest virtual machine to attack the hypervisor and gain control of the host — are a looming threat, according to David M. Lynch, vice president of marketing at Embotics. “The only question is, when, not if, a viable attack will occur.”
Key Information Systems to Present Security Webinar:
Data Leakage – Combating Your Biggest IT Security Threat
Workhorse in the Computing Cloud for Next Generation HPC Data Centers IBM has been the leading provider of High Performance Computing (HPC) solutions across a wide range of application and industry segments over the last few decades. This strategy of alleviating customer pain points by delivering a rich portfolio of innovative solutions has been the cornerstone of IBM’s long […]
New network security software and services enables organizations to protect critical data resources from accidental and intentional intrusion and loss.
As Technology Partner, Key will implement new Azaleos appliance to migrate and monitor Exchange 2007 servers.
New fault tolerance solution enables organizations to protect critical virtual workloads for the first time, supporting server virtualization
New Marathon high availability offering will complement Key’s core expertise in HA, fault tolerance and virtualization.
Company will exhibit latest in VoIP and server blade virtualization at two important IT industry events set for early May in Anaheim, CA