HP selects Phoenix to be a Converged Infrastructure Partner

Partnership demonstrates Phoenix’s expertise in server, storage and networking.

Read More

Companies are ignoring customer demand for better Cyber Security

IT Governance survey finds surprising inaction in the face of growing customer scrutiny.

Read More

CDNetworks expands Cloud security

DDoS protection joins current security offerings including PCI Certification, SSL & origin protection.

Read More

IBM to acquire Trusteer

New IBM Cybersecurity Software Lab in Israel will focus on mobile and application security, counter-fraud and malware detection.

Read More

TDAzlan appoints UK MD

TDAzlan-SDG, the enterprise division of Tech Data, has appointed Gareth Hansford as UK Managing Director, to lead the company during its next phase of development.

Read More

Capitalonline taps IBM

Capitalonline Data Service Co., LTD (CDS), one of China’s leading internet data center (IDC) service providers, has engaged IBM to develop a robust infrastructure for delivering enhanced cloud solutions. As part of this multi-million dollar engagement, IBM will build and manage CDS’s public cloud service based on IBM SmartCloud technology.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
Latest Hornetsecurity advancement in cybersecurity provides businesses with automated awareness...
 NCC Group, global cyber security and risk mitigation expert, is offering unique threat...
Despite concerns, organisations lack the budget (75 per cent) and training (80 per cent) to combat...
With 60% of organizations taking more than four days to resolve cybersecurity issues, Unit 42's...
Research indicates that encrypted connections have become the preferred method for malware...
Research from Netacea reveals businesses don’t understand up to half of the traffic on their...