IT managers face a number of challenges when delivering IT services – from managing vast amounts of data to securing mobile devices to doing it all with limited staff and budget. Kaseya surveyed IT professionals about their biggest challenges and presented the findings in The State of IT Systems...
Read post
Ponemon Institute released the results of its 2012 Cost of Cybercrime Study: United States study, which sheds light on the real economic impact of cyber attacks. The study revealed that ““the average annualized cost of cyber crime for 56 organizations in our study is $8.9 million per year, with...
Read post
Welcome to the Wednesday edition of the IP news roundup, where you will find the latest headlines in big data, network security, disaster recovery and cloud:
Here’s another sign that nerds are poised to take over the world … according to the Harvard Business Review, the sexiest career of...
Read post
Here’s a roundup of today’s IP news:
The 2012 Gartner CIO survey revealed that global spending on security will reach $60 billion this year, representing an 8.4% increase from last year. By 2016, global security spending will increase to $86 billion. According to the study, the...
Read post
A new report by MokaFive states that the majority of businesses now allow employees to use their personal devices at work. According to the results of the BYOD: The IT Perspective survey, 88% of respondents said their companies have some form of BYOD, whether it is sanctioned or not.
However,...
Read post
Although VoIP is a mature technology within corporate networks, a new report released by Sonus Networks Inc. and Webtorials states that SIP trunking is still in the early stages of adoption. The first annual SIP Trunking State-of-the-Market Report reveals that two-thirds of organizations make...
Read post
Although the Canadian SIP trunking market is relatively small, a new report released by NBI/Michael Sone Associates reveals that the market experienced 85% growth during 2011 and is expected to total $25 million this year.
The 2012 Canadian SIP Trunking Market Report examines the current state,...
Read post
Although virtualization can pose a number of security challenges—such as increasing network complexity and developing new avenues of attack—it can also create opportunities for improved security. InformationWeek’s Next-Generation VM Security report states that “virtual software appliances...
Read post
[White Paper] Conquering Today’s BYOD Challenges Aruba Networks
Read post
[Brief] Future Tech: Where Will Telephony Be in Two Years? VoIP-News.com
Read post
An Intel survey confirmed the important role that security plays when it comes to choosing both public and private cloud services. Security either formed the foundation of respondent’s decisions or played a strong role in their selection of a cloud deployment model. Here’s what the...
Read post
A report released by InformationWeek explores how CIOs can balance IT’s need for optimized performance and increased control with the business’s needs for lower costs and agility.
The 2012 State of the Data Center report states, “Technically, data center design and operations have gotten...
Read post
A report released by Symantec revealed that the Internet security company blocked 5.5 billion malicious attacks in 2011, an increase of 81% from the previous year. The latest annual Internet Security Threat Report stated that the increase in attacks was due in part to the increased use of advanced...
Read post