Trend Micro evolves mobile security solutions
  • Posted on 25th February 2014 in by Phil Alsop

Company’s CEO unveils comprehensive mobile security offerings at Mobile World Congress.

Read More
Keeping mobile devices more secure
  • Posted on 25th February 2014 in by Phil Alsop

Symantec is showcasing its most recent mobile solutions for both businesses and consumers this week at two industry conferences, Mobile World Congress and RSA Conference 2014.

Read More
Emulex announces Endace Fusion Connector for Sourcefire Defense Center
  • Posted on 25th February 2014 in by Phil Alsop

Emulex Corporation has announced the Endace Fusion Connector for Sourcefire Defense Center, enabling 100 per cent packet capture at speeds up to 100Gb Ethernet (100GbE) and seamless click-through workflow between the security event and the packets on the EndaceProbe™ Intelligent Network...

Read More
Beware of suspect devices
  • Posted on 24th February 2014 in by Phil Alsop

Two recent incidents show that attacks involving the Internet of Things are becoming a reality. Keith Bird, UK MD of Check Point looks at how smart devices are starting to be exploited.

Read More
Releasing your inner innovator

The role of the IT Director is changing. Having fought for years to gain a seat on the board, with...

Read More
Gloucestershire County Council selects Steria

Steria will help to drive efficiencies within Gloucestershire County Council’s ICT...

Read More
Trend Micro SafeSync keeps data safe end-to-end for Calligo’s offshore cloud customers

Trend Micro is pleased to announce a new partnership with Jersey-based cloud provider Calligo,...

Read More
Zscaler SHIFT advances Internet security

Intelligent routing automatically applies adaptive security policy to dynamic Internet threats;...

Read More
Transics outsources IT Infrastructure

European fleet management solutions provider, Transics, has selected SunGard to provide a high...

Read More
NTT Com Security and Palo Alto Networks sign global Managed Security Services agreement

NTT Com Security and Palo Alto Networks have entered into a global managed security services...

Read More
Essex County Council chooses Fujitsu for £16.6m IT transformation project

Fujitsu has secured a deal with Essex County Council to transform its Corporate Systems estate....

Read More
ISACA issues first audit programs aligned with COBIT 5

Global IT association ISACA has issued five new audit programs—the first of more than 30...

Read More
AlienVault continues rapid expansion of Open Threat Exchange

AlienVault™ has announced continued momentum behind its Open Threat Exchange™ (OTX)...

Read More
Lessons learnt from blocking millions of cyber attacks

FireHost has announced the release of its 2013 year in review Superfecta report (available for...

Read More
DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool...

Read More

Videos

Ian Schenkel, Chief Revenue Officer, Cyber Intelligence House (CIH), explains how the company’s intelligence-driven Cyber Exposure Platform is designed for MSSPs to deliver high margin, high value services...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, looks at consolidated data protection - endpoints and SaaS.
David Rimmer, Microgrid Business Leader UK&I at Schneider Electric, outlines the ways in which data centre microgrid deployments can contribute to energy cost savings, energy resilience and independence, and...
Michael Anderson, VP, Business Development at Abstract Security, discusses the launch of the company’s PAINT Partner Program (Partnerships, Alliances, and INTegrations), designed to empower resellers, MSPs,...

Expert Opinions

By Krishna Vishnubhotla, Vice President of Product Solutions, Zimperium.
By Anna Pavlova, Senior Vice President for Strategy, Market Development, and Sustainability, CarbonQuest.
By Bob Wambach, VP, Portfolio & Strategy, Dynatrace.
By Straightline Consulting’s Managing Director, Craig Eadie.