Fat lady sings as Dell transforms the Royal Opera House's IT infrastructure
  • Posted on 23rd April 2015 in by Phil Alsop

Full end-to-end IT deployment from the desktop to the data centre.

Read More
Comprehensive threat protection?
  • Posted on 23rd April 2015 in by Phil Alsop

Fortinet says that it is protecting customers at every entry point into the network with its expanded Advanced Threat Protection (ATP) framework, which extends from endpoint devices all the way to the data center. The company today announced enhancements to its FortiClient solution, which enables...

Read More
BT puts CA Technologies Identity and Access Management Software at the core of its Cloud Identity Service
  • Posted on 23rd April 2015 in by Phil Alsop

CA Technologies and BT have revealed that CA Secure Cloud, CA’s identity and access management (IAM) solution for managed service providers, has been integrated into BT’s new managed identity service, BT Assure Cloud Identity. BT’s service helps protect business data wherever...

Read More
2 out of 3 IT pros put systems at risk of downtime and security violations
  • Posted on 23rd April 2015 in by Phil Alsop

Netwrix 2015 State of IT Changes Survey reveals that nearly 70% of organisations continue to make undocumented changes and only 50% audit their IT infrastructures.

Read More
Allied Telesis selects Kaspersky Lab to provide advanced threat protection

New security products to feature industry-leading technology.

Read More
RSA ujnveils Via family of smart identity solutions

RSA Via is among the first Smart Identity solutions that is designed to dynamically protect...

Read More
RSA Security Analytics extends visibility from the endpoint to the Cloud

New pricing and packaging options including throughput-based pricing, subscription services and the...

Read More
HP launches Cloud access security platform

HP’s commitment to data-centric security was demonstrated by its recent acquisition of...

Read More
Organisations continue to rely on outdated access controls

Cryptzone has revealed the results of a network security survey conducted with TechValidate. The...

Read More
Sugar joins BeyondTrust 

Former Northrop Grumman Chairman and CEO Dr. Ronald D. Sugar joins privileged account...

Read More
CipherCloud launches Cloud Discovery Enterprise Edition

Dramatically enhances visibility, monitoring, and analysis of shadow IT at a global level.

Read More
FireMon 'reinvents' Security Monitoring 

FireMon has released a significant advancement of its core platform through the introduction of...

Read More
Cloud-based Privileged Identity Service

Centrify has launched Centrify Privilege Service (CPS), said to be the industry’s first...

Read More
AlienVault works with HP

AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to...

Read More
Huawei appoints Vincent Pang as Western Europe President

Huawei has appointed Vincent Pang as President of Huawei's Western European Region. In his new...

Read More

Videos

In this video we talk to David Bradley from Legrand at DC Ireland 2024
In this video we talk to Ajay Kareer from HARTING at DC Ireland 2024
In this video we talk to Micheala Hogan from RAYN at DC Ireland 2024
In this video we talk to James Brophy from Everest at DC Ireland 2024

Expert Opinions

AI is at the heart of the manufacturing revolution, driving efficiency, sustainability, and precision as we head into 2025, says Digant Shah, Chief Revenue Officer (CRO) Bosch SDS.
By Liz Centoni, Chief Customer Experience Officer, Cisco.
By John Kreyling, Managing Director, Centiel UK.
By Daniel Bailey, Senior Vice President and Regional Sales Leader EMEA at Genesys.