Panda Security launches Panda Cloud Fusion
  • Posted on 18th March 2014 in by Phil Alsop

Panda Cloud Fusion is an integrated solution to protect, manage and support all devices on the IT network, including smartphones and tablets.

Read More
F5 Statement zur Rede von Neelie Kroes, EU-Kommissarin für die Digitale Agenda, auf der CeBIT 2014
  • Posted on 18th March 2014 in by Phil Alsop

Neelie Kroes, EU-Kommissarin für die Digitale Agenda, hat in ihrer Rede auf der CeBIT 2014 in Hannover behauptet, dass Millionen Menschen auf der ganzen Welt kein Vertrauen mehr in das Internet haben

Read More
Internet der Dinge: Die angekündigten Investitionen reichen nicht aus
  • Posted on 18th March 2014 in by Phil Alsop

Von Sabine Bendiek, Geschäftsführerin, EMC Deutschland GmbH, und Mitglied des Hauptvorstands BITKOM

Read More
Change detection technology has changed - for the better
  • Posted on 17th March 2014 in by Phil Alsop

By Mark Kedgley, CTO, New Net Technologies.

Read More
Nearly two in three companies are undergoing a major IT transformation

More than 1,100 CIOs and IT professionals surveyed indicate they are pulled in multiple directions...

Read More
UK channel providers over-reliant on vendors

38% of resellers do not or will not collaborate with fellow service providers.

Read More
F5 erweitert Synthesis-Architektur mit höherer Absicherung für das Web und erweitertem Schutz vor Betrug

Die neuen Lösungen bieten Unternehmen einen breitgefächerten Schutz für Netzwerke,...

Read More
LogRhythms neue Identity Interference Engine verknüpft Benutzer-IDs mit Security-Ereignissen

LogRhythm 6.2 hilft dabei, auf Cyber-bedrohungen noch schneller und effizienter zu reagieren. Die...

Read More
Total and Databarracks to provide cloud services in new partnership

With over 25 years of experience between them, service providers Total Ltd and Databarracks are...

Read More
ISACA guidance on managing vendors using COBIT 5

Guide provides sample SLAs, case studies and mappings.

Read More
Veracode partners with Imperva

Technology integration simplifies compliance and enables faster vulnerability mitigation,...

Read More
Three-quarters of consumers say organizations don’t care about protecting their data

Most consumers just don’t believe that the personal and financial data they submit to...

Read More
Unzufriedene Kunden durch ineffizientes Papiermanagement

Einer Iron Mountain-Studie zufolge verlieren Unternehmen ihre Kunden, weil sie ihr Papier nicht in...

Read More
Check Point collaborates with VMware

Check Point automates network security for VMware virtualization and cloud environments.

Read More
Steria survey reveals that overconfidence threatens the security of UK's enterprises

Steria has revealed that 96% of UK’s enterprises believe they are capable of dealing with a...

Read More

Videos

Rob Finn, VP International Sales at Chainguard, discusses the company’s new Global Partner Program, offering flexible incentives, technical enablement, and go-to-market support to empower channel resellers...
In this video, we talk to RiT Tech at the DCA's 10x10 2025
In this video, we talk to Wesco Anixter at the DCA's 10x10 2025.
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, provides a comprehensive, insightful overview of the many topics and technologies impacting the Business Continuity Disaster Recovery (BCDR) landscape...

Expert Opinions

By Philip Miller, AI Strategist, Progress Software
By Ben Coleman, Wholesale Account Director UK at 11:11 Systems.
By Rami Jebara, CTO and Co-Founder at Hyperview.
As the streaming landscape evolves, content security through DRM becomes crucial for FAST and AVOD platforms to balance reach with protection.