IPsoft: Automatisierung des IT-Betriebs erfordert klar strukturierte Service-Transition-Prozesse
  • Posted on 25th March 2014 in by Phil Alsop

Ein detaillierter Projektplan und eine stringente Methodologie sind bei Service-Transition-Prozessen extrem kritische Erfolgsfaktoren, meint Managed Services Provider IPsoft. Nur so bleiben Projekte bei der Automatisierung des IT-Betriebs im Zeit- und Kostenrahmen.

Read More
Arbor Networks veröffentlicht „Peakflow Mobile Network Analysis“ – für Visibilität und Erkennung von Bedrohungen in mobilen HSPA- und LTE-Netzen
  • Posted on 25th March 2014 in by Phil Alsop

Deutscher Launch von „Peakflow Mobile Network Analysis“ / Erweiterung der Peakflow Sicherheitslösung speziell für Mobilfunkbetreiber / mehr Transparenz und Sicherheit in Mobilfunknetzen /  für mobile HSPA, HSPA+ und LTE Netzwerke

Read More
Protecting against DDoS attacks and their exploitation of DNS
  • Posted on 24th March 2014 in by Phil Alsop

By Chris Marrison, EMEA Technical Director, Infoblox.

Read More
Arbor Networks introduces Pravail® Security Analytics
  • Posted on 24th March 2014 in by Phil Alsop

Arbor Networks Inc. has introduced Pravail Security Analytics for advanced threat detection, incident response and security forensics. The technology delivering this solution was developed by Packetloop, a Sydney, Australia-based innovator in the field of Big Data Security Analytics that was...

Read More
Cryptzone leverages encryption expertise

MAP version 10.3 for Android encrypts individual files as they are saved to a mobile device.

Read More
HP Enterprise Services granted Pan-Government Accreditation at IL3 status following CSA STAR award

HP the first major Cloud Service Provider in the UK to receive this award and one of the first to...

Read More
Businesses don't care about PRISM, finds new survey

Intralinks-commissioned survey reveals the majority of companies are not at all concerned about the...

Read More
Kent Police fined £100,000 after interview tapes abandoned at former station

The Information Commissioner’s Office has served a monetary penalty of £100,000 on Kent...

Read More
‘Transformer’ companies outpace the ‘average’ enterprise

Riverbed and Loudhouse survey of 1,000 IT decision makers finds that while strategic IT...

Read More
Sicherheitsbericht von Dell SonicWALL: Bitcoin-Mining-Botnets breiten sich immer weiter aus

SonicWALL enttarnt Angriffsstrategien und verzeichnet zahlreiche Zero-Day-Schwachstellen ---...

Read More
Trustwave acquires Cenzic

Company to deliver dynamic and static application security testing as integrated,...

Read More
Datenlöschmanagement -  großes Interesse am Blancco Messestand

Wie lassen sich große Datenmengen schnell, verantwortungsvoll und nachhaltig nutzen?

Read More
Elanity bietet neuen Cloud Backup- und Recovery-Service auf Basis von Quantum-Lösungen

IT-Service Provider Elanity als Quantum Managed Service Provider (MSP) zertifiziert

Read More

Videos

Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...

Expert Opinions

By Chris Ackerson, SVP of Product at AlphaSense.
By Manvinder Singh, VP of Product Management for AI at Redis.