Logo
Unisys unveils Stealth solution
  • Posted on 14th October 2013 in by Phil Alsop

New Unisys Stealth for Mobile solution protects against data breaches and other cybersecurity risks created by proliferation of consumer devices in the workplace.

Read More
Ensuring application performance and security resiliency
  • Posted on 14th October 2013 in by Phil Alsop

New PerfectStormTM platform validates applications, security, storage, networking, voice and video in today’s data centre at near terabit performance levels.

Read More
Neustar to host International DDoS Awareness Day
  • Posted on 14th October 2013 in by Phil Alsop

Speakers from law enforcement, government and security industry join forces to educate and raise awareness about DDoS attacks and protection.

Read More
Ping Identity introduces PingOne for groups
  • Posted on 14th October 2013 in by Phil Alsop

Ping Identity®, The Identity Security Company™, has announced PingOne for Groups. Built on the PingOne cloud identity management service, PingOne for Groups is simple enough for small- and medium- sized organisations, and secure enough for enterprise departmental single sign-on (SSO)...

Read More
Novell announces strategic partnership with MobileIron for Secure Mobile File Access

Novell Filr integration with MobileIron AppConnect provides mobile users access to and ability to...

Read More
GFI Software adds another layer of security

Latest enhancement makes GFI one of the industry’s leading vendors offering antivirus, patch...

Read More
HP enhances Just Right IT Partner Program

NetworkIT and Simply StoreIT programs simplify technology selection for SMB customers.

Read More
Barracuda expands cloud offering on Windows Azure cloud platform

Barracuda provides complete application security and secure remote access to Windows Azure.

Read More
Beta release of Red Hat Enterprise Linux 6 now available

To keep pace with the demand for enterprise-class infrastructure, the newest version of the leading...

Read More
Computer 2000 becomes Tech Data

Computer 2000 is changing its name to Tech Data. The rebrand means that the UK business is now...

Read More
Softcat cements HP expertise with Platinum Partner status

Softcat has achieved HP’s highest possible accreditation through an on-going concerted...

Read More
Cyberkriminalität kostet deutsche Unternehmen im Schnitt 5,7 Millionen Euro im Jahr

Cyberkriminalität kostet deutsche Unternehmen im Schnitt 5,7 Millionen Euro pro Jahr - ein...

Read More
Neue 24-Stunden-Meldepflicht für Datendiebstahl stellt besondere Anforderungen an die E-Mail Sicherheit

Mit dem 25. August 2013 ist eine neue Verordnung der Europäischen Union in Kraft getreten, die...

Read More
Globale Inhaltsspeicherung mit Echtzeitbenachrichtigung: PRISM und Tempora gingen wohl Hand in Hand

Schon seit 2007 lauf das Spähprogramm PRISM der NSA. E-Mails, Privatnachrichten, Chats und...

Read More

Videos

Johan van Hover, Business Manager at Arteco Coolants, outlines the company’s history as a joint venture between Chevron and TotalEnergies and its reputation for high performance coolant technologies,...
Noam Brousard, Vice President, Solutions Engineering, proteanTecs, explains how semiconductors are straining under GenAI workloads such as model training, inference, and high-performance AI applications, and...
Maxime Vermeir, Senior Director of AI Strategy at ABBYY, discusses the results from ABBYY’s State of Intelligent Automation: GenAI Confessions 2025 survey, which reveals challenges in implementing Generative...
Data Centre World Asia 2025

Expert Opinions

By Nadeem Azhar, Founder and CEO of a Houston-based technology firm specializing in technology-driven efficiency solutions.
Tim Grieveson, Chief Security Officer at ThingsRecon discusses the latest vulnerabilities affecting MSPs especially when a partnership is mismanaged.
By Eric Herzog, CMO at Infinidat.
By Caroline Fanning, Chief Employee Success Officer at The Access Group.