Hot Technology for the Agile Enterprise

Derek Kol

Subscribe to Derek Kol: eMailAlertsEmail Alerts
Get Derek Kol via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Derek Kol

Author:  Kiri Bowman, Business-Software.com Kiri Bowman of Business-Software.com speaks with with Vice President of Products Chris Schin and Chief Marketing Officer Gary Sevounts about how Zetta.net stands out from other enterprise cloud backup solutions. Tell me a little bit about Zetta.net. What business or IT challenge does your company solve? Gary: Zetta.net is an enterprise-grade backup and disaster recovery provider. We have been in business for over five years, and we have over 800 enterprise customers and managed service providers (MSPs) that use or resell our product, as is the case with MSPs. In terms of the IT challenges, the biggest issue companies' face is loss of business critical data. Zetta.net provides a secure and reliable cloud and local backup, archiving and disaster recovery solution to backup and restore data in the event of data loss. Today, ... (more)

Thwarting Cyber Threats with Advanced Secure KVM and KM Technology

Cyber attacks are increasing at an exponential rate and can arise within any type of institution as rigorously as those originating from outside sources. When this happens, the potential exists for maliciously altered peripherals to gain control, intercept, and/or access resources beyond users' PCs and into any computer network that the PC is attached to. One of the most under-utilized preventative measures for thwarting cyber attacks is KVM (keyboard/video/mouse) switching devices. These devices allow employees in any type of business to securely switch between networks with va... (more)

Recovering from Cryptolocker with Cloud Backup

Author:  Nick Mueller, Zetta.net In September, a new type of trojan ransomware, CryptoLocker, started making the rounds by way of email attachments and links on infected webpages. It won't destroy anything on your computers, just encrypt the data so you the user can't access it. Once the files are encrypted, a screen pops up directing the user to pay a ransom of $100 to $300 (or two Bitcoins) within three days to regain access to the files. Beyond the 72-hour deadline, the ransom rises to 10 Bitcoins (About $3000). CryptoLocker itself is not difficult to remove, the damage comes f... (more)

The Maturity of Today's PRM Technology

TreeHouse InteractiveTM, the technology leader in on-demand partner relationship management solutions will host a free webinar titled Commercial Partner Relationship Management Software: New Advances, New Maturity on November 7 at 1 p.m. EST. The webinar will feature Tim Harmon, principal analyst with Forrester Research, Inc., leading expert in sales enablement. The webinar is part of the TreeHouse Interactive Fall Webinar Series designed to help marketing and channel professionals increase their sales, marketing and channel partner effectiveness. Channel-oriented technology ven... (more)

SHI Feeds SMBs' Appetite for Cloud Backup with Zetta.net

Author: Courtenay Troxel, Zetta.net With the cloud in its sights as a fast-track strategy for growth, SHI International Corp. has partnered with Zetta.net to round out its expanding portfolio with an enterprise-grade cloud backup and disaster recovery (DR) solution. SHI, which has transformed over the years from a $1 million "software-only" reseller into a $4 billion global provider of information technology products and services, says cloud offerings are crucial to attracting small- and medium-size businesses, which are constantly looking for ways to reduce cost, increase effi... (more)