Juniper adds intrusion deception on the firewall
  • Posted on 27th February 2014 in by Phil Alsop

Juniper Networks has announced Juniper Argon Secure, an advanced anti-malware service for Juniper Networks® SRX Series Services Gateways to identify malware that traditional solutions cannot detect. Building on Juniper’s success using Intrusion Deception to prevent attacks against web...

Read More
Facebook archiviert Daten auf Blu-Rays
  • Posted on 27th February 2014 in by Phil Alsop

Facebook entwickelt ein auf Blu-ray Technologie basierendes 1 Petabyte Storage-Rack und spart 80% Energie- und nicht zuletzt auch fortlaufende Migrationskosten

Read More
E-Mail-Spione düpieren: SEPPmail und ACP IT Solutions mit Wick Hill auf der CeBIT 
  • Posted on 27th February 2014 in by Phil Alsop

Durch die Medienberichte der vergangenen Wochen und Monate gewinnt man den Eindruck, die NSA lauert hinter jeder Ecke, in jedem System und Netzwerk

Read More
RSA Conference 2014: Verstärkte Kooperation zwischen den Staaten und der Sicherheitsindustrie auf internationaler Ebene schaffen
  • Posted on 27th February 2014 in by Phil Alsop

--- Art Coviello schlägt vier Grundprinzipien vor, um das Vertrauen in die digitale Welt in Zukunft zu stärken ---  Intelligenz-getriebene Technologien, Prozesse und Tools sollen sinnvoll eingesetzt werden, um die effiziente Verteidigung der zunehmend komplexen IT-Umgebungen vor...

Read More
Blue Coat to deliver ‘transformative’ security solution with HP

Lifecycle defence delivers operational control by aligning perimeter protection with actionable...

Read More
Majority of UK companies now view cyber threat as a top 3 business risk

90% of British businesses surveyed expect the number of cyber attacks to increase.

Read More
Thales announces support for F5 Synthesis Architecture

F5 BIG-IP support for Thales hardware security modules offers customers highest levels of security...

Read More
McAfee expands Comprehensive Threat Protection

McAfee has announced expanded capabilities to find, freeze, and fix advanced threats faster to win...

Read More
Dell Software expands Dell One Identity

Integration of Dell’s identity governance and privileged management solutions provides a...

Read More
Check Point introduces Software-defined Protection security architecture

‘Revolutionary’ security blueprint powered by collaborative intelligence.

Read More
Dynamic expansion plans at Dubai’s Modern Bakery

Modern Bakery in Dubai has selected Fujitsu for a highly strategic project to update the...

Read More
Attack mitigation security architecture for enterprise networks

Radware's visionary approach offers wider detection and stronger mitigation coverage to address...

Read More
Lancope announces Global Secure Partner Program

Program enables reseller partners to capitalise on rapidly growing market demand for...

Read More
Secure mobile access

Newest release of Dell SonicWALL secure mobile access solutions enables mobile worker productivity...

Read More
Accenture collaborates with IPsoft

Helping clients quickly anticipate and react to business and market changes through the adoption of...

Read More

Videos

DCW Asia 2025 - Part 1 of 3
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
DCW Asia 2025 - Part 3 of 3
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...

Expert Opinions

IDTechEx Technology Analyst Noah El Alami discusses the potential of the new generation of nuclear technologies – fission small modular reactors (SMRs) and fusion energy – in powering the ever-increasing...
By Derek Thompson, Senior VP & GM, EMEA, Workato.
By Manvinder Singh, VP of Product Management for AI at Redis.
By Graham Jarvis, Freelance Lead Journalist - Business and Technology, Trudy Darwin Communications