Google has released a video tour of one of its data center campuses, the latest in a series of public glimpses of the technology and security powering its global fleet of data centers.
With the COVID-19 pandemic, securing IT networks is more challenging and more essential than ever, as social distancing lockdowns add to an explosion of end users and connected devices.
Nelson Fonseca has been named Chief Executive Officer for Cyxtera Technologies, with Cyxtera founder and CEO Manuel Medina becoming Executive Chairman for both Cyxtera and AppGate, the recently-announced spin-out of Cyxtera’s security businesses.
In security and privacy, the big event of 2018 was the arrival of the European Union’s General Data Protection Regulation (GDPR). So why are so many reporting that they’re still not compliant -and may never be?
DCF’s Voices of the Industry columns provide expert insights from industry leaders. Here’s a look at the Top 10 Voices columns of 2018 focused on trends like renewable energy, IT security, and data center construction.
IT security will once again be a key issue in the data center industry in 2019, according to the four thought leaders in the DCF Executive Roundtable.
This is the third post in a four-part series from Cyxtera that explores crucial elements to consider before choosing a colocation provider. This post focuses on ensuring your colocation provider is prepared to provide physical and virtual security for your data center.
Threats will continue to escalate, both in number and sophistication, and having a sound data center security strategy that includes colocation can be the best way to mitigate your threat risk. David Mettler, Vice President of Sales and the Market Director for the US at IO, explains why continually evaluating and updating your data center security strategy is mission critical.
Cyxtera launches with a focus on secure infrastructure, bringing together next-generation security startups and a data center network spanning 2.6 million square feet of space and 3,500 customers.
Let’s face it, your data is valuable and the bad guys are constantly looking for ways to get in. Beyond data breaches, IT Asset Disposal is critical for both security and environmental awareness. Now, find out how to mitigate risk and how to create an ITAD policy.