News & Analysis - Page 2
eWEEK IT SCIENCE: Revulytics Usage Intelligence data has made it much easier to understand the file types and manipulations customers actually use within Extensis font and image software.
IT BUSINESS ANALYSIS: A strategic initiative that Dell calls the “compute continuum” emphasizes OEM solutions that can be effectively deployed, managed and supported from the edge of the network to on-premises data centers to the cloud, regardless of complexity, environmental or scale challenges.
The startup officially launches its platform in an effort to help organizations better secure data across multicloud deployments.
A new version of Coverity Static Application Security Testing provides broader testing capabilities to help organizations find vulnerabilities in code.
DAILY VIDEO: Trustwave improves Secure Email Gateway to reduce email threats, and why Hyatt is launching a public bug bounty program.
eWEEK DATA POINTS: To better serve new and existing customers, many enterprises are turning to technologies such as voice assistants to improve their customer care capabilities. Voice UI has grown alongside that of digital assistants such as Siri, Google, Cortana and Alexa and has shaped consumer...
NEW IN THE CLOUD: The latest update to the Salesforce Commerce Cloud includes a number of features designed to make it easier for consumers to find products and easier for the companies that sell them to manage everything.
PRODUCT ANALYSIS: Ping’s Intelligent Identity Platform provides customers, employees and partners with intelligent access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale.
TREND ANALYSIS: Major data breaches made headlines, advanced data analytics gained wider adoption, new applications for AI emerged and blockchain continued to disrupt. More of the same--only with increased data stores--is expected in 2019.
The first major milestone update to the open-source Metasploit Framework since 2011 is now available, making it easier for security researchers to test cyber-security defenses against exploits.