The wireless wave of change
  • Posted on 13th January 2014 in by Phil Alsop

By Ian Kilpatrick, chairman of Wick Hill Group, specialists in secure infrastructure solutions.

Read More
2014 will be “The Year of Encryption”
  • Posted on 9th January 2014 in by Phil Alsop

Along with broad-based use of encryption and biometric technologies, expect increased focus on securing enterprise BYOD programs and “bring your own security” trend.

Read More
Spiceworks debuts security integrations
  • Posted on 9th January 2014 in by Phil Alsop

Spiceworks has announced a series of updates that simplify how more than 4 million IT professionals manage their technology environments. The new features are designed to give IT professionals access to the security and help desk tools they need to get their jobs done more efficiently, all from a...

Read More
AlienVault brings security threat insight to millions
  • Posted on 9th January 2014 in by Phil Alsop

New AlienVault Threat Alerts feature in Spiceworks 7.1 provides IT professionals with real-time, actionable information from the world’s largest crowd-sourced threat intelligence database.

Read More
Measurement and analysis are key

Continuity Software has announced the results of the Continuity Software IT Operations Analytics...

Read More
2014 trends

Allied Telesis predicts that management, security and optimization of infrastructures will be the...

Read More
Orange Business Services acquires Atheos

Orange Business Services has announced the acquisition of Atheos, becoming the largest European...

Read More
Lancope’s Tom Cross named Ponemon Institute Distinguished Fellow

Fellows help Ponemon educate global organisations on improving data protection initiatives.

Read More
FireEye announces acquisition of Mandiant

FireEye has acquired privately held Mandiant, the leading provider of advanced endpoint security...

Read More
Securing the enterprise from DDoS attack: A unique opportunity for ISPs and MSSPs

By Darren Anstee, Solutions Architect Manager for Arbor Networks.

Read More
Five steps businesses need to take to become cyber robust in 2014

One of the biggest challenges for businesses in the New Year is to become ‘cyber...

Read More
Happy Secure 2014

AppRiver's senior security analyst, Troy Gill, offers his top 10 list of security resolutions...

Read More
WatchGuard's top 8 security predictions for 2014

Could a Hollywood hack come true? Will there be a U.S. Healthcare.gov data breach? Should you...

Read More
Cloud feeds on Cloud

According to a recent independent pan-European survey, cloud-based identity and access management...

Read More
The race to stem cybercrime using biometrics is on

Aite Group assesses nine emerging technology vendors that could bring biometric authentication into...

Read More

Videos

Eric Herzog, Chief Marketing Officer at Infinidat, outlines how and why Infinidat has seen outstanding success with the launch of the InfiniBox® G4 Family, creating a new foundation for the future with...
Trustmarque, a leading technology services partner, and Ultima Business Solutions, a specialist in managed services and automation, have completed their merger. Simon Williams, CEO of the new group explains...
Richard Jelbert, CEO of Cyberrock, discusses how, in today’s fast-changing digital landscape, businesses of all sizes face relentless cyber threats often without the dedicated resources or in-house expertise...
Welcome to the WinStar Introductory Presentation!

Expert Opinions

By Pete Wilson, Senior Director, Channel Sales EMEA, Illumio.
By Sadiq Syed, SVP Digital Buildings, Schneider Electric.
By Buddie Ceronie, GM for Telecommunications, VertiGIS.
By David Trossell, CEO and CTO of Bridgeworks.