Sophos delivers Advanced Threat Protection for the small and mid-market

Sophos has announced an extensive update to its award winning Unified Threat Management solution, Sophos UTM.

Read More

Company culture is holding back the Connected Business, not technology

Enghouse Interactive survey reveals culture and structure is inhibiting the growth of connected businesses, despite most organisations going social.

Read More

Software takes centre stage

New user-vendor forum set to define and promote OpenFlow-based, merchant-optical networking solutions, offering unprecedented orchestration of packet and optical technologies for next-generation data centers and cloud service providers.

Read More

Tech Data Europe appoints SVO, Operations

Johan Vandenbussche will report to Néstor Cano, President Europe.

Read More

Tangled web of IT applications stunts digital transformation

Crowded application landscape is overwhelming IT departments and eroding competitive edge.

Read More

Information Governance Services to mitigate risk

HP doubles down on solving information governance challenges with a strong combination of services and HP Autonomy technology.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
Powered by WatchGuard’s Unified Security Platform® architecture, new Fireboxes deliver enhanced...
Venafi has released a new research report, Organizations Struggle to Secure AI-Generated and Open...
Attack chain visualization and real-time identity correlation equip security teams to outpace...
Kaseya has released the results of its 2024 Kaseya Security Survey. IT professionals reported user...
Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...
As AI becomes central to business operations, UK CIOs focus on aligning strategies, governance, and...