Storage and data security vendor, Imation, has appointed Matt Drake as Australia and New Zealand (A/NZ) senior sales engineer.
Storage and data security vendor, Imation, is on the hunt for local Microsoft channel partners to support the "surprisingly dramatic impact" of the Windows 8 operating system (OS), according to Asia-Pacific (APAC) general manager, Sven Radavics.
Imation, a storage and data security company, has acquired Nexsan, a vendor of disk-based storage systems, in a deal worth about US$120 million, the company announced.
Tandberg Data, Imation and Fujifilm have announced separately that they are shipping the new LTO-6 tape drive technology offering up to 1.4TB per hour throughput.
Hewlett-Packard, Acer, Dell and Imation are suing the Dutch government over new levies on hard disks, smartphones, tablets and MP3 players that are meant to compensate the music and movie industries for losses caused by home copying.
Storage and data security vendor, Imation, is launching its first mobile security partner program which is “fairly typical for the security space,” according to Asia-Pacific (APAC) general manager, Sven Radavics.
Storage vendor Imation today announced it has acquired intellectual property and other assets of online backup provider Nine Technology.
Panasonic has appointed Matthew Connolly to the position of product marketing manager of unified communications.
Sign up now »
Both a challenge and solution are presented here for deploying equipment offsite in co-location sites or the cloud.
iAsset is a channel management ecosystem that automates all major aspects of the entire sales,marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.
- Chinese hackers resume attacks on U.S. targets
- Govt asks industry for help to stem security breaches
- Peculiar malware trail raises questions about security firm in India
- Attack on Telenor was part of large cyberespionage operation with Indian origins, report says
- Smartphones take center stage in two-factor authentication schemes