Return to the The Data Chain website homepage

Welcome to thedatachain

About thedatachain

thedatachain is all about the business of information logistics - from creation to deletion - taking the data centre as the hub around which today's IT issues revolve. Here you'll find up-to-the-minute videos on topics including The Cloud, Virtualisation, Compliance, Consolidation, Hosting, Outsourcing, Power & Cooling, and Convergence as well as specific technology sectors including security, applications, networking, storage networking, servers, operating systems, power, cooling, cabling and physical data centre infrastructure.

thedatachain team has many years' collective experience in publishing and marketing within the data centre and more general IT markets, and has built this website to reflect the importance of providing an information resource that is in tune with today's 'Facebook' generation.

Big Data Use Case

30 Jan 2014

Learn how the various data management and processing tools are used 

View video details

Cyber Security. Evolved.

16 Sep 2013

In less than 300 seconds you can experience the speed and intensity of a cyber attack.

View video details

Alert Logic Introduces First Fully Managed Suite of Cloud Security Products

10 Nov 2014

Alert Logic Cloud Defender Delivers Full Stack Threat Detection and Protection; Drives Complexity and Cost Out of Cloud Security

 

Alert Logic, the leading provider of Security-as-a-Service for the cloud, today announced availability of Alert Logic Cloud Defender, a new, fully managed cloud-based security and compliance suite that offers the functionality of a managed Security Information and Event Management (SIEM) solution without the cost and complexity of a traditional, on-premises, in-house SIEM.  Delivering the functionality, security content and actionable intelligence that organisations need to uncover and remediate active threats, Alert Logic Cloud Defender protects organisations from cyber threats targeted at business critical infrastructure, wherever it’s deployed – on-premises, in a public cloud or in a hybrid datacenter. 

Read news post

Zscaler Launches New Advanced Persistent Threat Protection

20 Oct 2014

Zscaler, the Internet security company, today introduced the Fall 2014 release of the Zscaler Internet security and compliance platform. Available now, Zscaler Fall 2014 includes breakthrough new capabilities for Advanced Persistent Threat (APT) protection, guest Wi-FiZscaler, the Internet security company, today introduced the Fall 2014 release of the Zscaler Internet security and compliance platform. Available now, Zscaler Fall 2014 includes breakthrough new capabilities for Advanced Persistent Threat (APT) protection, guest Wi-Fi security, global administration, policy management and reporting and instant assessment of security risks.  security, global administration, policy management and reporting and instant assessment of security risks.

Read news post

The future of Big Data – drawing insight from the deluge

03 Oct 2014

The future of Big Data – drawing insight from the deluge

By Mark Steel, CEO at IP EXPO Europe 2014

 

Big Data has truly taken hold of the tech world over the last few years, and it shows no signs of slowing down. Gartner research suggested that by 2015, 4.4 million IT jobs globally will be created to support Big Data, with 1.9 million IT jobs generated in the US alone, while SNS research forecasts that Big Data investments will account for $76 billion worldwide by 2020. What’s more, for every Big Data-related role created in the US, there will be an additional three jobs created for people outside of IT – for instance, artists and designers to forge data visualisation – meaning that within the next year, a total of 6 million jobs in the US will be created by the Big Data boom.

Read article

Absolute Software helps UK’s leading commercial radio group transform mobile device management

10 Oct 2013

Global’s IT team has to manage around 1,700 valuable mobile devices, used across the UK. Sales staff are frequently out of the office meeting prospects whilst staff at the Exeter office, which covers south west England, may only come into the office once a fortnight.

Read article

Negative reinforcement: How NOT to improve user behavior

23 Sep 2013

One of the interesting aspects of security awareness training is the intersection of information security with human resources. We know from experience that security practitioners are not always experts in the latter, but what we recently saw from Dave Clemente was a real doozy.

Read article

The BYOD dilemma

17 Sep 2013

There is a myth amongst businesses that if you welcomingly accept BYOD (Bring Your Own Device) into the workplace, it will increase productivity.

To some extent, this is true. On the other hand, however, there is the issue that if you don’t have an IT infrastructure that can handle a large number of different devices accessing the network, day to day operations can’t be properly carried out.

Read article
 



Copyright 2010-14 The Data Chain Website design and management by CBJ Digital Ltd.