Pulse Secure signs Arrow  

Announces distribution agreement with Arrow in Europe.

Read More
CA Technologies to acquire Xceedium

CA Technologies has signed a definitive agreement to acquire privately held Xceedium, Inc., a provider of privileged identity management solutions that protect on-premise, cloud and hybrid IT environments. Terms of the agreement were not disclosed. The transaction is expected to close within the...

Read More
Blue Coat launches Endpoint Alliance Ecosystem

Blue Coat Systems has unveiled its Alliance Ecosystem of Endpoint Detection and Response (EDR) partners. Blue Coat developed this ecosystem to allow actionable intelligence gathered from endpoint security solutions to be shared with the entire Blue Coat security portfolio, enhancing...

Read More
Hacks proliferate, while financial institutions bank on data protection to limit exposure in the cloud

CipherCloud has released its Q2 2015 Global Cloud Data Security Report. This quarter's report...

Read More
Disjointed technologies as biggest challenge facing UK IT security pros

Lack of qualified staff named second biggest challenge with user access and vulnerability...

Read More
Exposing hidden threats in encrypted mission-critical enterprise applications

Delivers industry’s first visibility solution that includes stateful SSL decryption to...

Read More
Sophisticated cyberattacks are defining the innovation race between adversaries and defenders

Findings underscore the need for retrospective analysis to reduce Time to Detection.

Read More
Sophos research reveals state of IT security in local government organisations

Two thirds of local government organisations adopt a shared services approach to cut IT costs but...

Read More
Firewalls deliver secure, high-speed 802.11ac wireless network performance

Dell’s high-performance wireless network security solutions are easy to install and manage,...

Read More
Huawei establishes an Open Platform Ecosystem for the finance industry

Huawei will partner with eleven of the world’s leading banking IT solution providers to...

Read More
BeyondTrust introduces first commercial least privilege solution for Apple desktops in the enterprise

BeyondTrus has released PowerBroker for Mac to address security and compliance concerns among the...

Read More
Network access control - changed for the better

Christian Buecker, CEO, macmon secure gmbh, says network access control (NAC) is needed now more...

Read More
Vormetric appoints Louise Bulman as Vice President of EMEA

Vormetric, a leader in enterprise data security for physical, virtual, big data and cloud...

Read More
Gigamon’s Security Delivery Platform wins support from FireEye

Gigamon's GigaSECURE Security Delivery Platform fully supports and interoperates with the...

Read More

Videos

Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
In this interview, Josh Ewing, VP of eNlighten Managed Services at Namos Solutions, discusses how managed services are evolving beyond traditional break-fix models towards value-led, outcome-focused delivery....
Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...
Andy, Data & AI Director at Pax8, explores what the agentic inflection point means in practice and how AI is moving beyond experimentation into real-world application. He breaks down the 'empty box' approach...

Expert Opinions

By Jamie Woodhall, UK Technical and Innovations Manager at Rentokil Specialist Hygiene.
Cooling is one of the most expensive operational outlays in data centre operations: reducing its cost and improving Power Usage Effectiveness (PUE) is therefore one of the primary challenges for data centre...
By Chris Riche-Webber, VP of Business Intelligence and Analytics, SmartRecruiters.