The Bi-Directional Cloud Highway: Critical Insights into Today’s Cloud Infrastructures

The development of the cloud over the last 15 years is one of the most significant convergences of computing and communications technologies in history. It provides unprecedented agility and scalability for organizations, immediate access to information and transactions for individuals and has transformed our global economy similar to smartphones and Continue Reading

Expiring Support for Older Software: Renew & Upgrade for the Latest Features & Improved Security!

As our products have evolved over the years, with new features added regularly, older versions of our software are eventually no longer supported. Effective July 30, 2019, technical support will be discontinued for the following product versions: MDaemon – Versions 14.5.x and below Security Gateway – Versions 4.5.x and below Outlook Connector Continue Reading

5G Implications for Security

Mobile network infrastructures have evolved dramatically over just a few short years. The evolution from 3G to 4G, for example, enabled the mobile infrastructure to deliver new data-centric services to consumer, such as rich multimedia, along with enhanced content capabilities and services. 5G will enhance the power and capacity of mobile Continue Reading

CentOS News

CentOS15 – Blog.CentOS.org

Happy birthday, CentOS! [embedded content] 15 years ago, the CentOS project started up in order to fill a gap left by a change in the way that Red Hat decided to market their product. Many of the people that were involved in those early days are still involved today, although Continue Reading

How to Achieve Automated, Intelligence-Driven Security

Over the last couple of years, cyberattacks have evolved in both scale and effectiveness, affecting organizations across all industries and geographic regions. Successful cyberattacks are a growing industry-wide problem in spite of billions being spent on cybersecurity solutions. Part of the reason is that new techniques- and in fact a Continue Reading

Minimizing Cyber Risks as Healthcare Providers Increase Technology Use

The healthcare sector has undergone dramatic changes in the past several years, primarily spurred by the adoption of new medical technology. Beginning with the adoption of electronic health records (EHRs) and continuing on into the increased use of medical applications, online patient portals, connected devices, and wearables, the healthcare sector Continue Reading

Integrating Artificial Intelligence into Cybersecurity: Protecting IP, Data, and Networks with AI

In recent years we have seen a surge in the way companies have leveraged technology to drive new revenue streams and create a unique competitive advantage in the marketplace. The companies that have been the most successful are the ones using Artificial Intelligence (AI). AI is already being used by Continue Reading

Partnering with an MSSP for a More Secure Digital Business

In just the past few years, network architectures have begun to evolve from traditional, point-to-point connections between controlled network devices to a highly meshed ecosystem of interconnected networks. This hyper-connected architecture of traditional, private, public cloud, and remote networks and devices is being driven by the need to leverage data as Continue Reading

CIO Agenda: Facing Challenges in the Era of Digital Transformation

In the past years the role of IT professionals got shifted towards a more strategic dimension and often comes with the term of „transformation“. Especially CIOs are facing more and more challenges in an environment of digital disruption.  In the next five years, CIOs expect their companies’ digital revenues to Continue Reading

Univention and ownCloud: A Docker (Love) Story

This is a guest blog post by our partner Univention.  Docker has been one of the buzzwords in recent years. Containers in itself are nothing new in the Linux world, and anyone using a shared web space is almost certainly using some container implementation. Docker, however, provides management interfaces and Continue Reading

>