Outsourcery and Dell join forces
  • Posted on 11th November 2013 in by Phil Alsop

Outsourcery plc is working with Dell to design and deploy the compute, storage and networking infrastructure for its IL3 offering for the UK’s central government. As a supplier of technology and services to the UK’s public sector, Dell is well positioned as a strategic go-to-market...

Read More
International conservation charity migrates to the Cloud
  • Posted on 11th November 2013 in by Phil Alsop

The world’s largest nature conservation partnership, BirdLife International, is rationalising and improving its globalised security strategy to future proof against cyber threats and reduce management costs.

Read More
Making a secure decision
  • Posted on 11th November 2013 in by Phil Alsop

With more and more organisations turning to Cloud and IT services the issue of security is continuously being raised. Stefan Haase, Divisional Director at InTechnology, discusses what effective security measures to take before deciding which Cloud service provider to use.

Read More
Intralinks and Field Fisher Waterhouse team
  • Posted on 8th November 2013 in by Phil Alsop

New report proposes best practice on legal compliance in corporate collaboration.

Read More
Softcat climbs the ranks with Check Point Software Technologies Platinum accreditation

Softcat has reached the top level of the Check Point Software Technologies’ partner hierarchy...

Read More
Fujitsu strengthens its global solutions portfolio

Fujitsu and Check Point Software Technologies to jointly market Check Point Integrated Appliance...

Read More
Cisco simplifies Application Lifecycle Management

Cisco begins the transformation of information technology (IT) by delivering Application Centric...

Read More
Fujitsu road tests the data centre highway with no speed limits

Technology demonstration showcases light speed data centre of the future.

Read More
Avnet Technology Solutions adds HP ArcSight

Avnet Technology Solutions has extended its portfolio of enterprise security product offerings in...

Read More
Server attacks continue to rise

Majority of survey respondents still rely on antivirus, which is ineffective against advanced...

Read More
Easynet-Umfrage: Deutsche Unternehmen sind gar nicht so restriktiv bei Social Media

Die Benutzung von Social Media wie Facebook, YouTube oder Twitter durch Mitarbeiter wird in...

Read More
(ISC)²® introduces Healthcare security and privacy certification

(ISC)² establishes global standard of competency for healthcare information security and...

Read More
Four new FlexPods

Cisco and NetApp are introducing four new FlexPod capabilities with additional features to simplify...

Read More

Videos

Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...

Expert Opinions

By Jon Healy, Regional Strategic Operations Officer at Salute.
Andrew Winters, executive vice president- managed detection and response from Obrela discusses the telecoms industry’s distinctive cyber threat profile
By Nico Gaviola, Vice President, Emerging Enterprises and Digital Natives, Databricks.