IBM POWER9 scale-out servers deliver more memory, better price performance vs. Intel x86

IBM recently began shipping its next-generation Power Systems servers incorporating its newly-designed POWER9 processor. These POWER9-based scale-out systems, including S914, S922, S924, H922, H924 and L922, provide leadership capabilities in…

Continue ReadingIBM POWER9 scale-out servers deliver more memory, better price performance vs. Intel x86

Avoiding the Five Stages of Grief for a Successful Visibility and Access Control Program

  On Wednesday at RSAC, Mitch Greenfield of Humana led a session describing his team’s experience deploying a network visibility and access control system. The session, titled Avoiding the Five Stages of Grief for a…

Continue ReadingAvoiding the Five Stages of Grief for a Successful Visibility and Access Control Program
Read more about the article The Three AWS Web Application Firewall Managed Rules You Need to Deploy Now
Futuristic presentation by a businesswoman in white

The Three AWS Web Application Firewall Managed Rules You Need to Deploy Now

A mind-boggling number of applications reside in the cloud without any protection. No web app firewall. No identity or access control. Nothing. They’re just out there, open to attack. That’s…

Continue ReadingThe Three AWS Web Application Firewall Managed Rules You Need to Deploy Now

IBM Sets Tera-scale Machine Learning Benchmark Record with POWER9 and NVIDIA GPUs; Available Soon in PowerAI

 IBM THINK in Las Vegas, we are reporting a breakthrough in AI performance using new software and algorithms on optimized hardware, including POWER9 with NVIDIA® V100™ GPUs. In a newly published benchmark,…

Continue ReadingIBM Sets Tera-scale Machine Learning Benchmark Record with POWER9 and NVIDIA GPUs; Available Soon in PowerAI

Be Proactive when it comes to database protection

Breaking-down-the-security-immune-system-proactive-database-protection-through-siem-integration. Protecting data requires strong integration of security controls. For example, a database firewall that analyzes data activity on a monitored system does not typically provide insight into what is…

Continue ReadingBe Proactive when it comes to database protection