Content chaos still reigns at most enterprises

Stunning 82 percent of firms lack an enterprise-wide content management solution, and half of all content still sits outside ECM systems.

Read More
MigSolv partners with Next Connex on Open Access Network for Norwich

Europe’s leading independent Computer Room and Data Centre Specialist, MigSolv, has partnered with Next Connex to deliver an Open Access Network into its Norwich data centre.

Read More
Delivering Big Data analytics

Juniper Networks has unveiled the Junos® Network Analytics suite, a family of next-generation big data analytics and network intelligence solutions that now includes the BizReflex and NetReflex products.

Read More
Open backup and archive for virtualised environments

Quantum Corp. has announced enhancements to the popular Quantum vmPRO™ software that bring open standard data protection and archive capabilities to virtualised environments. In addition to disk or cloud, vmPRO 3.1 now leverages Scalar LTFS tape technology to provide user-accessible,...

Read More
Corero appoints worldwide sales leader

Corero Network Security is pleased to announce the appointment of David Ahee as Senior Vice...

Read More
RASCOM and Ciena light first 100G link from Russia to Western Europe

8,600 km long network supports international low-latency and 100GE connectivity services.

Read More
Dell sets sights on Cisco

Dell SonicWALL’s Network Security Appliance (NSA) Series Next-Generation Firewalls offer the...

Read More
Easynet scores industry first with EtherStream V

Easynet is first to market as it launches new bonded fibre access product.

Read More
F-Secure UK and Ireland appoints Mark Hodgson as head of marketing

F-Secure has announced the appointment of Mark Hodgson as the UK and Ireland head of marketing for...

Read More
NetIQ earns EAL 3+ Common Criteria Certification for Identity Manager

Accredited security certification demonstrates NetIQ commitment to delivering secure identity...

Read More
Cisco competency check

BYOD Competency Audit will measure partners’ readiness to help customers cope with the...

Read More
Permabit adds compression and replication to Albireo Deduplication

Permabit Technology has announced data compression and replication applications that integrate with...

Read More
KEMP adds new security features to load balancers

LoadMaster family gets Pre-Authorisation, Single Sign-On (SSO) and Persistent Logging at no...

Read More
TwinStrata frees customers from backup software and disaster recovery headaches

CloudArray 4.5 includes new snapshot scheduler, on-demand disaster recovery, enhanced bandwidth...

Read More

Videos

Alain Sanchez, EMEA CISO, Fortinet, discusses the findings of the company’s recent Global Cybersecurity Skills Gap Report that highlights the critical need for a collaborative, multi-faceted approach to...
Gartner’s leading cybersecurity analysts, Michael Kranawetter and Jie Zhang, discuss the findings of two recent research reports – the Hype Cycle for Cyber-Risk Management, 2024 and the Hype Cycle for...
Dr Clare Walsh, Director of Education at the Institute of Analytics (IoA), and one of the of the world’s leading academic voices in data analytics and AI, discusses the ways in which AI will (and won’t)...
Vladimir Goliashev, Director of MSSP and MDR of Group-IB, explains why threat intelligence, as part of an overall Unified Risk Platform, is one of the best tools available to help MSPs and MSSPs to help their...

Expert Opinions

By Matthieu Bourguignon, Senior Vice-President and Head of Europe for Network Infrastructure Business at Nokia.
Frank Horenberg, Zivver’s Head of IT, and Simon Newman, Co-Founder of Cyber London, do a deep dive on the issue of investment in cybersecurity tools.
By Rachel Banks, Head of Product Management, Apogee Corporation.
By Graham Jarvis, Freelance Business and Technology Journalist, Lead Journalist – Business and Technology, Trudy Darwin Communications.