Corero announces integration with Verisign OpenHybrid
  • Posted on 16th April 2015 in by Phil Alsop

Corero Network Security has announced its integration with Verisign OpenHybrid and support for Verisign’s open standards-based approach for hybrid DDoS solutions. For Verisign and Corero customers, this integration combines on-premises technology from Corero Network Security to defeat...

Read More
Nokia and Alcatel-Lucent to combine
  • Posted on 15th April 2015 in by Phil Alsop

Nokia and Alcatel-Lucent intend to combine to create an innovation leader in next generation technology and services for an IP connected world.

Read More
Widening gap between perimeter security perception and reality
  • Posted on 15th April 2015 in by Phil Alsop

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach.

Read More
Akamai Cloud Security Intelligence is the foundation for new services
  • Posted on 15th April 2015 in by Phil Alsop

Recognising the crucial role data analytics play in more effectively fighting cloud security threats, Akamai Technologies has unveiled the foundation underpinning its award-winning Cloud Security Solutions. Known as Akamai Cloud Security Intelligence, a data processing engine within the Akamai...

Read More
AlienVault  launches Beta version of Open Threat Exchange 2.0

Company continues to see rapid growth for its unique crowd-sourced Open Threat Exchange with 26,000...

Read More
Monitoring overall network health

Industry leader in continuous network monitoring introduces Assurance Report Cards in its flagship...

Read More
FireMon acquires mmediate Insight to expand security solutions portfolio

Acquisition delivers first-ever combination of proactive network security intelligence and...

Read More
CipherCloud unveils Global Compliance Resource Centre

Interactive online resource details data privacy laws in more than 80 countries.

Read More
Data security - top tips for senior managers

Ian Kilpatrick, chairman Wick Hill Group, explains why senior managers now need to be more involved...

Read More
NHS Dumfries and Galloway adopts a proactive approach to safeguarding patient data

Guarding against security threats with a state-of-the-art vulnerability management solution.

Read More
Safeguarding storage from unauthorised access

Lock & Key is part of Imation’s recently announced Secure Data Movement Architecture...

Read More
Majority of IT pros don’t see senior management taking enough responsibility for insider threat

IS Decisions report finds that IT professionals want more involvement from senior management on...

Read More
Singtel to acquire Trustwave

New strategic investor to help take Trustwave to the next level by accelerating growth.

Read More
Protectig digital information everywhere

Vera has emerged from stealth and unveiled its new data security solution built to give enterprises...

Read More
BeyondTrust helps University of Winchester strengthen security without hampering productivity

Least privilege model reduces security risk and supports overhead for a top 20 university.

Read More

Videos

Data Centre World 2026
Howard Pheby, newly appointed Chief Commercial Officer at Stellanor, explains how the company is building something different: urban colocation that serves enterprises where they actually operate, backed by...
Alex Adamopoulos, Chairman and CEO of Emergn, discusses the results of the company’s new research, which reveals that enterprise leaders now expect measurable returns from AI investments within months, not...

Expert Opinions

By Rick Vanover, Vice President, Product Strategy at Veeam.
By Matt Roberts, VP of Sales, OptiCool Technologies.
Harmonics pose a headache for electrical systems in many industries, but data centres are uniquely exposed to the risks. Scott Birchall, Data centres & HVACR application engineer, ABB, explains what harmonics...
By Philippe Omer Decugis, General Manager EMEA & SVP Sales, BlackLine.