Analysis Reports provided by Current Analysis, Inc.
Updated: 5 hours 55 min ago
The new, high-performance Z9500 switch and matching Active Fabric Controller from Dell combine high-density 10 and 40GbE capabilities with ‘pay as you grow’ flexibility which may well open data center doors that might have been closed in the past.
Avaya’s Automated Campus solution offers the reduced operational overhead of automation and simplified management of complex policies from the data center to the access edge. To really soar, the company needs to attract top tier partners.
Enterprise mobility management pure play SOTI launched a formalized channel partner program in an effort to accelerate the expansion of its base of channel partners, giving prospects lots of reasons to either switch or add EMM to their portfolios.
Palo Alto Networks announced its plan to acquire advanced endpoint anti-malware startup Cyvera for $200 million, filling out its network, cloud and endpoint triangle for advanced malware detection and blocking. Now, can it execute?
Cisco’s Nexus 9516 and Nexus 9608 pack lots of ports, non-blocking capacity and low power draw into the chassis switch. When the APIC ships, Cisco will have a full line of data center switches for data centers large and small(ish).
At its annual conference, SAS introduced a new Hadoop solution, refined its visualization capabilities, and previewed a new statistics tool. Such moves show an ability to embrace changing market expectations without sacrificing core competencies.
MobileIron surpassed revenues of $100 million in 2013, a year in which the company saw its average selling price increase by about 20% and swiftly expanded its partner ecosystem.
The sale of Alcatel-Lucent Enterprise (ALU-E) to China Huaxin will cause some turmoil with the company, but it is still executing on its data center networking vision. Cutting lose from the mothership may give ALU-E the room it needs to grow.
Target’s breach could have been prevented, if Target had the right balance of investments in the three key elements of good security: technology, people and processes.
Nobeysco Web Conferencing