Cloud Security Considerations

Our cloud experts have summarized the recently released report from the Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. Below are the highlights from...

How to Implement an Effective Cloud Security Strategy

By Vid Sista, Data Center and Security Practice Director

Cisco Unified Communications Enables Collaboration

Cisco’s Unified Communications (UC) solutions just got better. With a host of features and collaboration capabilities, there has never been a better time to upgrade. Some benefits and upgrades...

Security Trends and the Attack Continuum

By Vid Sista, Director of Technology Solutions

It’s time for a new threat-centric security model.

Online attackers are agile and innovative. The security industry is responsive, yet so many...

Successful VDI deployment

Accudata’s Best Practices: Top tips for a successful VDI deployment

10 Considerations When Moving to a Hybrid Cloud

By Darryl Vinson, Senior Consultant

Securing SCADA

Introduction to SCADA

Are you using your Load Balancer to its full capacity as an Application Delivery Controller (ADC)?

By Vid Sista, Director of Technology Solutions

Today’s ADCs are no longer just about load balancing. They are a mission critical component of delivering business applications for productivity, as...

DR/BC Planning for Data Breaches

When a data breach occurs, and the extent of data loss is known, the next question every one asks – customers, stakeholders, and regulators alike – is what did the organization do to prepare for the...

The Top Security Initiatives in 2015

You're probably being inundated with Top 10 lists for the new year. This list is not the same. Our security and compliance experts have worked together to identify the initiatives they feel are the...

1 ...
4 5 6 7 8

Leave a Reply

Your email address will not be published. Required fields are marked *