About
Subscribe
  • Home
  • /
  • Storage
  • /
  • Symantec, Wipro offer recovery infrastructure

Symantec, Wipro offer recovery infrastructure

By Leigh-Ann Francis
Johannesburg, 10 Dec 2009

Symantec, Wipro offer recovery infrastructure

Wipro has inked a partnership with Symantec to provide back up and loss prevention, in addition to recovery infrastructure consultancy services, reports Economic Times.

Symantec India channels and alliances director, Ajay Verma, says: "Information is the most valuable asset of any organisation and ensuring it does not fall into wrong hands is critical to its reputation and business. The partnership will offer customers a better insight into risk".

Symantec's loss prevention solution spans data at the endpoint, in storage and network. It will provide customers the confidence that their information is secure, he said.

Palm Pre data loss suit

A Palm Pre user is suing Palm and Sprint Nextel, alleging they caused him to lose most of the data from his phone, and he wants to turn the suit into a class action, states PC World.

The suit in the US District Court for the Northern District of California, in San Jose, is the latest black eye for the Palm Profile cloud-based synchronisation service, which debuted with the company's Web OS on the Pre earlier this year.

Palm and Sprint last month said "a small number of customers" had had trouble transferring their data from Palm Profiles to new Palm devices, and that they were working on a solution.

Scientists propose to end Web attacks

Research published by academics at the University of Bristol's Department of Computer Science suggests a new technology could render cyber attacks "computationally impossible", says Computing.co.uk.

The experts will present their research at the ASIACRYPT 2009 and cryptology conference being held in Japan this week. Paul Morrissey, Nigel Smart and Bogdan Warinschi will discuss how a new technique could be applied that makes Web site attacks impossible.

The researchers plan to demonstrate how encryption could be used to prevent attacks such as denial of service, while also providing two-factor authentication that does not overburden users. Both hardware and software issues will be discussed.

Share