Tackling the knowns, unknowns and known unknowns of today’s cyber security landscape

By Leon Ward, Director, Product Management, Sourcefire.

Read More

GFI Software adds another layer of security

Latest enhancement makes GFI one of the industry’s leading vendors offering antivirus, patch management and Web protection from a single, cloud-based solution.

Read More

HP enhances Just Right IT Partner Program

NetworkIT and Simply StoreIT programs simplify technology selection for SMB customers.

Read More

Barracuda expands cloud offering on Windows Azure cloud platform

Barracuda provides complete application security and secure remote access to Windows Azure.

Read More

Beta release of Red Hat Enterprise Linux 6 now available

To keep pace with the demand for enterprise-class infrastructure, the newest version of the leading Linux platform, the beta release of Red Hat Enterprise Linux 6.5, extends its scalability and manageability to aid in the build-out and control of large, complex IT environments. For example, Red Hat Enterprise Linux 6.5 will be designed to simplify the operation of mission-critical SAP applications by automating the optimal configuration of common SAP deployments.

Read More

Computer 2000 becomes Tech Data

Computer 2000 is changing its name to Tech Data. The rebrand means that the UK business is now operating under the same name as all the group’s European and global operations.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
New offering delivers end-to-end incident coverage, streamlined readiness, and up to 70% cost...
Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...
WISR survey findings reinforce impact of global DDoS extortion attack campaign.
AI could double the strain or solve it.
Infinigate’s reseller partners gain access to LogRhythm products to serve organisation’s...
Product integration delivers real-time detection and response, enhancing mobile device security.