Intelligent IT solutions for the Internet of Things

By Patrick Steiner, Lead Architect at Red Hat.

Read More

How data centre security can uphold online democracy

By Paul Dignan, Field Systems Engineer, F5 Networks

Read More

Organisations in EMEA take proactive security stance

Service providers and product vendors are collaborating to bring compelling solutions to these markets, says Frost & Sullivan.

Read More

Protecting data in the Cloud

Vormetric has released Vormetric for SaaS Providers. Security and compliance concerns have always hindered broad adoption of SaaS solutions by enterprise customers. Vormetric for SaaS Providers includes critical security controls that enable SaaS providers to address the most important of these concerns, and make broad enterprise adoption a reality. The solution includes field, file and folder encryption and associated data security controls that can be used to transparently shield enterprise...

Read More

Antivirus and firewalls are no longer enough

Wick Hill named distributor for Avecto.

Read More

Terbium Labs leverages MapR

More than 350 billion data fingerprints are used to automatically detect breaches in minutes.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
The integration of BeyondInsight 6.0 and SailPoint IdentityIQ provides a single solution for...
Subscription-based managed service provides around-the-clock access to security experts, endpoint...
The digital and the physical merge to create a tangled terrain.
Streamline remote management of network, server and data centers to securely and reliably ensure...
Service presents integrated view of cloud assets, offers automated remediation and monitors...
StealthAUDIT 11.5 helps organisations further minimise the risk of a data breach by delivering...