Enhanced protection for mobile devices
  • Posted on 9th January 2014 in by Phil Alsop

gateprotect is now offering an upgrade for its endpoint solution. “Complete Security – Mobile Protection” provides even better protection against evolving threats, malware and malicious applications on mobile devices. New features include unified management access for controlling...

Read More
Measurement and analysis are key
  • Posted on 8th January 2014 in by Phil Alsop

Continuity Software has announced the results of the Continuity Software IT Operations Analytics Benchmark. Based on results collected across a variety of industry verticals - including financial services, healthcare, manufacturing, and retail - the benchmark underscores the importance of...

Read More
2014 trends
  • Posted on 8th January 2014 in by Phil Alsop

Allied Telesis predicts that management, security and optimization of infrastructures will be the ICT trends that impact on enterprise networks over the next 12 months.

Read More
Fortinet helps secure entire network of leading financial services provider
  • Posted on 7th January 2014 in by Phil Alsop

Shriram Group, one of India’s largest asset financing companies, has deployed Fortinet‘s FortiGate® network security platform, FortiManager™ and FortiAnalyzer™ centralised management and reporting appliances and FortiClient™ endpoint security client to help secure...

Read More
Orange Business Services acquires Atheos

Orange Business Services has announced the acquisition of Atheos, becoming the largest European...

Read More
Lancope’s Tom Cross named Ponemon Institute Distinguished Fellow

Fellows help Ponemon educate global organisations on improving data protection initiatives.

Read More
FireEye announces acquisition of Mandiant

FireEye has acquired privately held Mandiant, the leading provider of advanced endpoint security...

Read More
Securing the enterprise from DDoS attack: A unique opportunity for ISPs and MSSPs

By Darren Anstee, Solutions Architect Manager for Arbor Networks.

Read More
Five steps businesses need to take to become cyber robust in 2014

One of the biggest challenges for businesses in the New Year is to become ‘cyber...

Read More
Seculert expands Executive Team

Leading Advanced Threat Protection solution provider hires IT security veterans to help accelerate...

Read More
Happy Secure 2014

AppRiver's senior security analyst, Troy Gill, offers his top 10 list of security resolutions...

Read More
WatchGuard's top 8 security predictions for 2014

Could a Hollywood hack come true? Will there be a U.S. Healthcare.gov data breach? Should you...

Read More
The race to stem cybercrime using biometrics is on

Aite Group assesses nine emerging technology vendors that could bring biometric authentication into...

Read More
Blue Coat acquires Norman Shark

Blue Coat Systems, Inc. has acquired Norman Shark, the global leader in malware analysis solutions...

Read More
5 resolutions to prepare IT pros for 2014 trends

ISACA highlights Privacy 2.0, slimmed-down big data, heated-up cybersecurity and data analytics job...

Read More

Videos

Howard Pheby, newly appointed Chief Commercial Officer at Stellanor, explains how the company is building something different: urban colocation that serves enterprises where they actually operate, backed by...
Data Centre World 2026
Rob Coupland, CEO at Pulsant, discusses the company’s £10 million investment in its Milton Keynes data centre to provide high-density, sovereign compute capacity to support AI transformation, with plans to...
Data Centre World 2026

Expert Opinions

By Alistair Barnes, Head of Mechanical Engineering at Colt DCS.
By Sujatha S Iyer, Head of AI Security at Zoho Corp.
By Matt Evans, CEO at Apx Data Centre Solutions.
By Leon Ward, Chief Transformation Officer, Securonix.