Chester Zoo protects critical IT infrastructure
  • Posted on 5th December 2013 in by Phil Alsop

Intrusion detection and prevention, and application control, add new level of security and reporting at zoo.

Read More
Türk Telekom Group signs agreement with HP
  • Posted on 5th December 2013 in by Phil Alsop

HP’s end-to-end cloud solution is framework for Türk Telekom Group’s new services for public and private customers.

Read More
Einfache Per-App-Sicherheit von der Applikation zum Unternehmen mit Junos Pulse AppConnect
  • Posted on 5th December 2013 in by Phil Alsop

Juniper Networks, der Branchenführer für Innovationen im Bereich der Netzwerktechnik, stellt das Junos® Pulse AppConnect Software Development Kit (SDK) vor. Dieses SDK ermöglicht Virtual Private Network (VPN) Verbindungen von Apple iOS und Google Android Geräten zum Junos...

Read More
Priveleged security at Volkswagen
  • Posted on 4th December 2013 in by Phil Alsop

Volkswagen Commercial Vehicles, part of the Volkswagen AG group, has implemented CyberArk’s Privileged Account Security solution to optimise its password management. As part of a security infrastructure project, Volkswagen Commercial Vehicles in Hanover, Germany, has introduced...

Read More
Traditional IT models under pressure as UK mid-market seeks growth

Frugal mid-market looking towards more non-licence-based and open source technology.

Read More
Tarmin ‘transforms’ Data Management

Tarmin Inc. hasunveiled the latest release of GridBank, the industry’s first Data Defined...

Read More
The Great Divide

Seventy-three per cent of UK businesses have no formal BYOD policy, while number of mobile users...

Read More
Don’t ignore cyber threats

According to new research conducted by the Department for Business, Innovation & Skills (BIS)...

Read More
Dell joins forces with Softcat on the NSSA to deliver servers and storage to universities

Dell has confirmed Softcat as one of its nominated resellers on the National Servers & Storage...

Read More
NTT Com Security empowers businesses to make proactive risk management decisions

MSS meets global demand for advanced information security and risk management capabilities.

Read More
The last rites of traditional IT security

Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against...

Read More
DISTREE confirms dates and venues for 2014 calendar of global channel events

Six events scheduled for year ahead including debut of DISTREE Africa. Providing ICT & CE...

Read More
Softcat partners with Websense

Softcat is partnering with Websense in its first inclusion on the recently updated G-Cloud 4...

Read More
UK IT skills shortage needs to be addressed, says Databarracks

Distinct lack of IT competence and training in UK businesses, according to annual report.

Read More

Videos

Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...
Heiko Ludwig, Global Head of Structure Finance at NORD/LB, discusses the findings of the company’s recent report, ‘Power Struggle: Meeting the challenge of financing data centres and the energy...

Expert Opinions

By Nadir Merchant, General Manager, IT Operations Suite, Kaseya.
By Richard Mitchell, Head of Channel, ThreatAware
By Cody David. Head of AI and Innovation. Syniti - part of Capgemini.
By James Preston, Principal Security Consultant at ANSecurity.