BYOx threatens to disrupt the IT landscape
  • Posted on 3rd February 2014 in by Phil Alsop

SolarWinds has released the results of its New IT Survey-, which sheds light on the evolving role of the modern IT professional in today's technology-driven business environment. Specifically, the survey results reveal that the consumerisation of IT, namely the emergence of BYOx (where x is...

Read More
WatchGuard Technologies extends real-time network security visibility tool
  • Posted on 3rd February 2014 in by Phil Alsop

WatchGuard Dimension now includes unlimited scalability and availability, intuitive reporting enhancements and new language support.

Read More
Trusteer partners with California State University
  • Posted on 3rd February 2014 in by Phil Alsop

Trusteer has completed a five week research study on computer malware with 10 student interns at the University of California, San Marcos (CSUSM) campus. The partnership between Trusteer and the University was created to investigate the impact of malware on the CSUSM campus.

Read More
Grant Thornton announces new global technology industry group
  • Posted on 31st January 2014 in by Phil Alsop

Grant Thornton has announced the creation of a global technology industry group. The group will provide a forum for Grant Thornton's technology specialists worldwide to share insights into the opportunities and challenges facing technology organisations, to help clients find solutions in this...

Read More
Barracuda extends NG Firewall model range

New model brings advanced WAN optimisation and integrated content security to remote locations.

Read More
IT pushing for greater collaboration on digital strategies, while marketing expects IT to solve its complex challenges

New research report from EPiServer reveals disconnect between perceived value of marketing and IT...

Read More
Gigamon: Neue NetFlow-Generation-Applikation zum Optimieren der Netzwerk-Infrastruktur

Neue Anwendung liefert bessere Flow-Level-Visibility und Netzwerkeffizienz

Read More
Zehn Dinge, die wir wissen, weil sie zu Papier gebracht wurden

Anlässlich des morgigen Datenschutztages macht Iron Mountain auf die Bedeutung von...

Read More
Silver Peak informiert: Cloud Computing benötigt intelligente und sichere Netzwerke

Verschlüsselung und automatische Wahl des Netzwerkpfads sind ein Muss

Read More
Syncsort Data Protection heißt jetzt Catalogic Software™ Innovationen für intelligentere Datensicherung

Catalogic Software, Pionier im Bereich intelligente Datensicherung und -verwaltung, hat sich als...

Read More
GID auf der CeBIT: Wissen bewahren – Zukunft sichern 

Unter dem Motto „Wissen bewahren – Zukunft sichern“ präsentiert sich die...

Read More
Arbor-Sicherheitsbericht 2013:

Dramatische Zunahme von hochvolumigen DDoS-Angriffen, APTs und Angriffen auf mobile Netzwerke

Read More
A fifth of UK organisations do not provide IT security training for staff

Survey reveals UK office workers do not understand basic security threats and organisations are...

Read More
Corporate and employee naivety is placing organisations at risk

Absolute Software releases the results of its Mobile Enterprise Risk research.

Read More

Videos

Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...

Expert Opinions

By Derek Thompson, Senior VP & GM, EMEA, Workato.
By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.
By Jon Healy, Regional Strategic Operations Officer at Salute.