The pressure is on to innovate

New study scorecards IT performance against business and customer-value building metrics; highlights benefits of embracing game-changing technologies

Read More

The adoption of advanced technologies is set to rise among Italian enterprises  

A new Kable survey finds that Italian enterprises are investing in advanced technologies such as communication & collaboration, green IT & virtualization and mobility.  

Read More

Security: A hot topic among top management  

By Wieland Alge, VP & GM of EMEA at Barracuda Networks.

Read More

Check Point launches Mobile Threat Prevention

New solution provides industry’s highest catch rate of mobile threats for both iOS and Android devices.

Read More

Security orchestration

Tufin Orchestration Suite R15-2 reduces the attack surface and increases security controls across heterogeneous networks.

Read More

HP hyperconverged appliance delivers enterprise resiliency and 'easy' Cloud onramp

New hyperconverged appliance combines built-in disaster recovery with next-generation servers and hybrid cloud orchestration for half the cost of competitors

Read More

Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...
Only 41% of privileged accounts are assigned to permanent employees of the business with the...
Threat of fines, not FUD, drives board decisions on cybersecurity spend.
Powerful technology coalition brings patent-pending Rocket Wallet™ service to millions of digital...
According to a new global survey fielded by the Business Performance Innovation (BPI) Network, in...
Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...