When the network is breached or disaster strikes, the right backup solution ensures you’ll always get your data back.
Sign Up for the Magazine

Departments

Tech Tips

Bring It On

As cyberattacks become more intense, businesses can take several steps to advance their defense strategies at any stage of the zero-trust maturity journey.

Security Save

See It All

Massive amounts of data spread among multiple infrastructures can overwhelm IT staff. Here are some tools and tactics to help.

Reviews

Reduce the Nuisance

The automated platform allows users to set custom responses to cyberthreats and incidents.

Dashboard

Three-Legged Stool

Plus: Internet ID laws cause spike in VPN usage; expensive breaches are very common.

Interview

Identity Crisis

Stolen and misused credentials are threat actors’ top attack strategy. Rohit Ghai, CEO of the security company RSA, explains what businesses can do about it.

IT Futurist

Sweet Victory

The technology presents a promising opportunity for the future of cyberdefense.

Reviews

Smaller Target

This platform enforces zero-trust security through the principle of least privilege.

Get Smart

Machine to Machine

From predictive maintenance to artificial intelligence-powered diagnostics, the IIoT is driving smarter industrial operations.

FAQ 5

Refresh and Recycle

How and when should you refresh endpoints and other IT assets? And what do you do with retired technology?

Features

Feature

Where the Magic Happens

Organizations such as the PGA TOUR and Alaska Airlines prefer the hyperscalers to owned data centers for their ambitious artificial intelligence projects.

Feature

Tech in Store

Whether opening new locations or managing break-fix issues, stores with hundreds or thousands of branches need standardized processes that work at scale.

Feature

D-FENSE

New network improves visual content on digital displays and simplifies arena operations, while advanced firewalls protect critical systems.

Opinion

Contributor Column

Prove It

Organizations need to see that new applications will do what they need in their particular environment.

Contributor Column

The Two-Headed Beast

Start with assessing your data assets, then ensure your people are trained to use the security tools you need.