Den gesamten Datenbestand lokal und in der Cloud verschlüsseln
  • Posted on 19th December 2013 in by Phil Alsop

Ubique Technologies verbindet Speicherdienst IntelliVault mit Security-Stick IndependenceKey

Read More
PoINT Storage Manager steigert Datensicherheit über automatisierte Replikation
  • Posted on 19th December 2013 in by Phil Alsop

Die PoINT Software & Systems GmbH hat in ihrem PoINT Storage Manager eine Replikationsfunktion integriert, mit der Daten auf Storage-Systeme im Capacity Tier und bzw. oder im Archive Tier repliziert werden können

Read More
Gigamon Visibility-Fabric-Apps und –Funktionen bieten die notwendige Big Data Traffic Intelligence für Unternehmen und Service Provider
  • Posted on 19th December 2013 in by Phil Alsop

Die neuen Applikationen ermöglichen intelligente Einblicke in große Datenmengen

Read More
Dell und Red Hat entwickeln OpenStack-basierte Private-Cloud-Lösungen
  • Posted on 19th December 2013 in by Phil Alsop

Im Rahmen einer erweiterten Zusammenarbeit unterstützen Dell und Red Hat weltweit Unternehmen beim Aufbau hochskalierbarer, OpenStack-basierter Private-Cloud-Lösungen

Read More
Corero appoints new VP of Sales EMEA

Adrian Bisaz appointed to build on Corero’s success in defending against DDoS, and malicious...

Read More
Companies need to clearly define data retention and deletion policies

One third of IT departments are putting their business at risk by failing to have data retention...

Read More
Accor hotels chooses McAfee Next-Generation Firewall for secure connections worldwide

McAfee says that Accor, one of the largest hotel groups in the world, has chosen its...

Read More
SolarWinds enhances security offerings

SolarWinds has announced enhancements to several of its security management solutions, including...

Read More
ElectraLink selects HP

HP to transform data transfer network utilising managed cloud environment under six-year contract...

Read More
IBM reveals five innovations that will ‘change our lives’

IBM has unveiled the eighth annual "IBM 5 in 5" – a list of innovations that have...

Read More
You can’t ignore BYOD and hope it will go away

Companies need to deal with the reality of BYOD, because it’s coming whether they like it or...

Read More
Five enterprise IT predictions for 2014

Brought to you by David Gibson, VP at Varonis Systems - a provider of software solutions for...

Read More
IT professionals just want appreciation and for you to reboot your computer

Ipswitch Network Management Division survey reveals pains and passion of hard-working network...

Read More
United Utilities gets connected with Fujitsu

United Utilities has tasked Fujitsu with transforming its IT estate. This new partnership...

Read More

Videos

Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
DCW Asia 2025 - Part 2 of 3

Expert Opinions

By Chris Ackerson, SVP of Product at AlphaSense.
By Fernando Rionegro, Vice President, Cloud and Network Services, Europe at Nokia.
By Terry Storrar, managing director, Leaseweb UK.
By Haris Pylarinos, Founder and CEO of Hack The Box