Imperva introduces Cloud Reference Architecture
  • Posted on 13th November 2014 in by Phil Alsop

New Reference Architecture provides validated blueprints for implementing comprehensive web application security on Amazon Web Services.

Read More
Sophos announces expanded security offerings through AWS Marketplace
  • Posted on 13th November 2014 in by Phil Alsop

Sophos has announced the expansion of their product portfolio on AWS Marketplace with the addition of a new secure server option for customers on Amazon Web Services (AWS). Building on the success of the Sophos UTM Next Generation Firewall product, which is offered through AWS Marketplace, the new...

Read More
CA Technologies CEO challenges business and technology leaders to build new capabilities
  • Posted on 12th November 2014 in by Phil Alsop

CEO Mike Gregoire kicked off CA World ’14 with a keynote address to thousands of customers and partners from around the world. In his address, he discussed the new business imperatives for companies in the Application Economy and challenged technology and business leaders to move quickly to...

Read More
Zycko and ObserveIT announce distribution partnership
  • Posted on 12th November 2014 in by Phil Alsop

Zycko has announced a new relationship with ObserveIT. A pioneer in user activity monitoring, ObserveIT is the only security company that provides tailored analytics, alerting and comprehensive forensics to effectively address the growing threat of user-based risk.

Read More
IT leaders taking wrong approach to accommodate shadow IT, says Talon Storage

Shadow IT threatens enterprise security as CIOs turn a blind eye.

Read More
Data breaches “inevitable” and regular changes to cybersecurity measures essential

Nuix, a technology company that enables people to make fact-based decisions from unstructured data,...

Read More
Alert Logic introduces fully managed suite of Cloud security products

Alert Logic, the leading provider of Security-as-a-Service for the cloud, today announced...

Read More
Rapid7 speeds investigations with interactive incident timeline

New capability in UserInsight enables incident responders to rapidly investigate and contain...

Read More
Securing your business in an increasingly complex IT landscape

By Russell Horton, COO at Elitetele.com examines the importance of securing your business against...

Read More
Dell introduces future-ready IT solutions

Dell delivers new solutions to help customers simplify and enhance flexibility for both traditional...

Read More
Businesses finding it harder than ever to protect sensitive data

77% of IT professionals surveyed believe sensitive business information is now more difficult to...

Read More
IT budgets set to grow 3.3% in 2015, hitting five-year high

Positive outlook for CIOs as budgets accelerate their move away from maintenance spending.

Read More
Kelway secures significant investment by CDW Corporation as part of management buyout

Kelway, the London-based IT Services and Solutions provider, hasannounced the buy-out of all shares...

Read More
Cloud-based email security specialist launches in the UK and EMEA

Mailprotector, a cloud-based email security, management and hosting specialist, is launching in the...

Read More
Over 70% of office workers don’t know who to report to regarding a security breach

Research conducted for the launch of UserLock 8 has found that fewer than a third of desk-based...

Read More

Videos

Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, discusses the current business continuity and disaster recovery landscape.
In this video, we talk to RiT Tech at the DCA's 10x10 2025
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, looks at consolidated data protection - endpoints and SaaS.

Expert Opinions

By Vivek Swaminathan, Director of Products and Solutions, Digital Workplace Solutions, Unisys.
Carlos Buenano, CTO for OT at Armis, outlines how cyber exposure management is reshaping protection strategies for remote and critical systems.
By Krishna Vishnubhotla, Vice President of Product Solutions, Zimperium.