Logo
Trend Micro SafeSync keeps data safe end-to-end for Calligo’s offshore cloud customers
  • Posted on 24th February 2014 in by Phil Alsop

Trend Micro is pleased to announce a new partnership with Jersey-based cloud provider Calligo, enabling it to offer customers of its offshore cloud a powerful sync and share service with full end-to-end encryption.

Read More
Zscaler SHIFT advances Internet security
  • Posted on 24th February 2014 in by Phil Alsop

Intelligent routing automatically applies adaptive security policy to dynamic Internet threats; Cloud-based service extends enterprise-class security architecture to broader market.

Read More
Transics outsources IT Infrastructure
  • Posted on 24th February 2014 in by Phil Alsop

European fleet management solutions provider, Transics, has selected SunGard to provide a high performance hosted environment to optimise the agility, flexibility and reliability of its solution. By deploying a broad range of Managed Services and Hybrid Cloud Services, Transics offers its customers...

Read More
NTT Com Security and Palo Alto Networks sign global Managed Security Services agreement
  • Posted on 24th February 2014 in by Phil Alsop

NTT Com Security and Palo Alto Networks have entered into a global managed security services agreement. Under the terms of the agreement, NTT Com Security (formerly Integralis) will provide its extensive implementation, integration, and managed security services around the Palo Alto Networks...

Read More
Essex County Council chooses Fujitsu for £16.6m IT transformation project

Fujitsu has secured a deal with Essex County Council to transform its Corporate Systems estate....

Read More
ISACA issues first audit programs aligned with COBIT 5

Global IT association ISACA has issued five new audit programs—the first of more than 30...

Read More
AlienVault continues rapid expansion of Open Threat Exchange

AlienVault™ has announced continued momentum behind its Open Threat Exchange™ (OTX)...

Read More
Lessons learnt from blocking millions of cyber attacks

FireHost has announced the release of its 2013 year in review Superfecta report (available for...

Read More
DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool...

Read More
Bit9 partners with Check Point Software Technologies

Bit9 and Check Point® Software Technologies Ltd. has announced a partnership to integrate the...

Read More
More than 575 million data records lost or stolen in 2013

Over 1.5 million data records were lost or stolen every day in 2013.

Read More
St.LukesHealth sees clearly with Varonis

Private health insurance provider knows if an unauthorised user tries to access its sensitive...

Read More
AlgoSec partners with Qualys

New integration delivers application-centric vulnerability management, aggregating and scoring...

Read More
New US Cybersecurity Framework developed by NIST features COBIT 5 in the core

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity...

Read More
Lancope introduces StealthWatch Labs security updates

Security updates from Lancope’s research team help customers combat today’s...

Read More

Videos

Ben Pritchard, AVK CEO, discusses the findings of a joint Wartsila and AVK-SEG white paper: Data centre dispatchable capacity: a major opportunity for Europe’s energy transition, which provides new analysis...
Data Centre World Asia 2025
Keith Sullivan, Director of Strategic Innovation at AFL, explains what meshing means in the context of data centres and why it is particularly important when it comes to GPU-intensive, AI compute workloads....
Data Centre World Asia 2025

Expert Opinions

By Nick Ewing, Managing Director at EfficiencyIT.
By Caroline Fanning, Chief Employee Success Officer at The Access Group.
By Ross Waite, Export Sales Manager at Balmoral Tanks.
By Michael Vallas, Global Technical Principal, Goldilock Secure.