ISMM accreditation for Azlan

Value-added distributor’s HP sales team achieves internationally-recognised qualification through award-winning TD Academy training portal.

Read More

Capgemini launches Anomalous Behaviour Detection with Pivotal

Unique new offer to detect and react to advanced internal and external business threats.

Read More

Unifying physical and Cloud security

Unified security architecture is capable of being mapped, tested and measured; enables more proactive threat prevention and auditable regulatory compliance.

Read More

Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide privileged access to valuable and confidential data. Because service accounts are not proactively managed, they represent an especially attractive target to a hacker.

Read More

Becrypt announces continued expansion in North America

Leading solutions provider for government information systems chooses Becrypt’s cyber security solutions.

Read More

Greater device visibility and management

Webroot has announced updates to Webroot SecureAnywhere® Business Mobile Protection. As more employees rely on their mobile devices for both personal and professional activities, the risk of mobile malware and unsafe applications presents challenges for organisations. A recent Harris survey showed that 60 percent of those using a mobile device for business have either no security or just the default features set on the phone.

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
Strategic software upgrade drives sustainable business growth through improved user experiences,...
Zero Trust Networking blocks unauthorized devices and users from corporate data access.
New integration launches strategic partnership to secure modern cloud infrastructure, applications,...
New global survey of 450 IT and security professionals reveals the full impact that the pandemic...
As cyber security providers fail Professional Services organisations, the sector is looking for...
LogMeIn has published results of a global study executed by IDG that reveals the new reality of...