Frank J. Ohlhorst

About

Frank Ohlhorst is an award-winning technology journalist and IT industry analyst, with extensive experience as a business consultant, editor, author, and blogger. Frank works with both technology startups and established technology ventures, helping them to build channel programs, launch products, validate product quality, create marketing materials, author case studies, eBooks and white papers.

How Cloud Management Suite Brings Axiom ‘Master of All I Survey’ to Life

Digital transformation had become one of the largest disruptions to how businesses deal with information technology. After all, the road to digital transformation is littered with speed bumps created by new technologies, such as hybrid, private, and public clouds, which can introduce the very silos that digital transformation seeks to destroy. What’s more, the prerequisite […]

How Cynet’s Platform Approach Tames Cyber-Security Issues

There is no denying that cyber-security has become an overly complex beast to manage. Dozens, if not hundreds, of cyber-security vendors all claim to have the most important pieces of the cyber-security puzzle, yet most lack any type of unified cyber-security offering. In other words, enterprises today have to use multiple vendor products to address […]

How NetMotion Ops Intelligence Brings Real-Time Analytics to Mobile Devices

Management thinker Peter Drucker once said: “If you can’t measure it, you can’t improve it.” These are words of wisdom that still resonate across businesses today. Nowhere is that quote more apt than in the ever-growing world of wireless IT, where IT departments have struggled to keep mobile workers connected to company resources to remain […]

How Yellowfin Brings Real-Time Insight to Business Analytics

Businesses are facing a huge challenge when it comes to deriving actionable insights from their business intelligence platforms. That challenge is exacerbated by numerous issues, such as noisy data, questionable relevance and scattered data sources. What’s more, most BI platforms on the market only offer a static look at the data and lack the ability […]

Vipre Cloud Applies Artificial Intelligence to Endpoint Security

Vipre Cloud Applies Artificial Intelligence to Endpoint Security It’s no secret that endpoints are constantly under attack from an ever increasing array of online threats. Yet few IT Pros seem to realize that their tried and true endpoint security applications are not evolving rapidly enough to counter the sophistication of those threats. Vipre Security aims […]

Comodo AEP Applies AI to Constant Battle Against Ransomware, Malware

Comodo AEP Applies AI to Constant Battle Against Ransomware, Malware Comodo’s Advanced Endpoint Protection (AEP) brings multiple cloud and endpoint technologies together to battle malware threats. AEP combines a cloud-based IT and Security Manager (ITSM) console with an endpoint client (Comodo Client) and an artificial intelligence-powered file analytics platform called Valkyrie. ITSM is designed to […]

Sophos Intercept X Thwarts Ransomware Before It Encrypts Files

Sophos Intercept X Thwarts Ransomware Before It Encrypts Files Ransomware may be the most perfect form of extortion the internet has ever seen. After all, attackers encrypt and lock files without warning and demand that ransom be paid using untraceable crypto-currencies, making it impossible for victims to trace the attackers, while those victims’ files are […]

TrackVia Quickens Digital Transformation With App Development Platform

TrackVia Quickens Digital Transformation With App Development Platform Digital transformation has become the clarion call for businesses seeking to leverage both mobility and the cloud. However, the process of digital transformation is anything but painless or fast. Organizations often have to re-create applications as well as rethink infrastructure to automate business processes. TrackVia aims to […]

TopSpin Security’s DECOYnet Uses Deception to Defend Networks

TopSpin Security’s DECOYnet Uses Deception to Defend Networks Many IT security professionals have come to rely on perimeter defense technologies in an effort to prevent attacks. However, as demonstrated by continual corporate data breaches, traditional security measures even when properly implemented, have come up short, attacks undetected and critical data exposed. Simply put, how can […]

NetMotion Mobility Delivers Powerful Device Management Tools

NetMotion Mobility Delivers Powerful Device Management Tools REVIEW: Many enterprises have attempted to bring reliable and secure mobility projects to fruition, only to experience the chaos of unreliable connections, which ultimately sap the productivity promised by a workforce on the go. Nowhere is this truer than with today’s smart devices, such as tablets, smartphones and […]