Azzurri adds to its cyber security credentials

Managed services provider achieves the Government’s new Cyber Essentials Plus accreditation.

Read More

Dell Software’s InTrust helps organisations securely collect, store, search and analyse data

New IT Search feature speeds security investigations and audits with single web interface, allowing IT to gain instant insight into user activity for security, compliance and operational visibility.

Read More

Sophos announces the future of comprehensive, simple-to-manage enduser protection

Sophos has announced new versions of key products that deliver on the company’s vision of Next-Generation Enduser Protection. Aimed at delivering unprecedented protection against malware and advanced threats, Next-Generation Enduser Protection includes the integration of Sophos’ innovative endpoint, mobile and encryption technologies.

Read More

Cohesive Networks introduces micro-perimeter security

Cohesive Networks has announced the availability of VNS3:turret. As the latest software offering in the VNS3 product family, VNS3:turret is a set encrypted, clustered software-only virtual instances that create a micro-perimeter around mission critical business systems.

Read More

Valldata selects Alert Logic to secure payment platform

Company achieves continuous threat detection, data protection with Alert Logic’s managed security solutions.

Read More

Managed Services & Hosting Summit 2015 date announced

Leading Vendors, Solution and Service Providers to meet in London in September 2015.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Survey reveals that hacking landscape will get much worse and IT security professionals cannot even...
According to IDC's Europe, Middle East, and Africa Quarterly Security Appliance Tracker, 2Q14...
While a majority of IT professionals believe the secure sharing and transferring of files is very...
IDC study finds that companies are choosing to go it alone with Threat Intelligence despite growing...
The past year has been a whirlwind tour of challenges and changes. Targeted threat activity...
2021 BYOD Security Report reveals security teams continue to lack visibility and technology needed...