Keeping mobile devices more secure

Symantec is showcasing its most recent mobile solutions for both businesses and consumers this week at two industry conferences, Mobile World Congress and RSA Conference 2014.

Read More
Emulex announces Endace Fusion Connector for Sourcefire Defense Center

Emulex Corporation has announced the Endace Fusion Connector for Sourcefire Defense Center, enabling 100 per cent packet capture at speeds up to 100Gb Ethernet (100GbE) and seamless click-through workflow between the security event and the packets on the EndaceProbe™ Intelligent Network...

Read More
Zscaler SHIFT advances Internet security

Intelligent routing automatically applies adaptive security policy to dynamic Internet threats; Cloud-based service extends enterprise-class security architecture to broader market.

Read More
NTT Com Security and Palo Alto Networks sign global Managed Security Services agreement

NTT Com Security and Palo Alto Networks have entered into a global managed security services agreement. Under the terms of the agreement, NTT Com Security (formerly Integralis) will provide its extensive implementation, integration, and managed security services around the Palo Alto Networks...

Read More
Transics outsources IT Infrastructure

European fleet management solutions provider, Transics, has selected SunGard to provide a high...

Read More
Gloucestershire County Council selects Steria

Steria will help to drive efficiencies within Gloucestershire County Council’s ICT...

Read More
Trend Micro SafeSync keeps data safe end-to-end for Calligo’s offshore cloud customers

Trend Micro is pleased to announce a new partnership with Jersey-based cloud provider Calligo,...

Read More
Releasing your inner innovator

The role of the IT Director is changing. Having fought for years to gain a seat on the board, with...

Read More
Beware of suspect devices

Two recent incidents show that attacks involving the Internet of Things are becoming a reality....

Read More
Essex County Council chooses Fujitsu for £16.6m IT transformation project

Fujitsu has secured a deal with Essex County Council to transform its Corporate Systems estate....

Read More
ISACA issues first audit programs aligned with COBIT 5

Global IT association ISACA has issued five new audit programs—the first of more than 30...

Read More
AlienVault continues rapid expansion of Open Threat Exchange

AlienVault™ has announced continued momentum behind its Open Threat Exchange™ (OTX)...

Read More
Lessons learnt from blocking millions of cyber attacks

FireHost has announced the release of its 2013 year in review Superfecta report (available for...

Read More
DNA to detect pass-the-hash vulnerabilities

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool...

Read More
Bit9 partners with Check Point Software Technologies

Bit9 and Check Point® Software Technologies Ltd. has announced a partnership to integrate the...

Read More

Videos

Ian Kilpatrick, former EVP of Nuvias and the driving force behind the newly established Tech Channel Ambassadors, explains the thinking behind the organisation – a new Community Interest Company (CIC)...
Stephen Douglas, Head of Market Strategy at Spirent, discusses the company’s 5th annual 5G outlook report, which finds that 5G Standalone (SA) market is picking up significant speed, alongside similar...
Leah Goldfarb, Environmental Impact Officer at Platform.sh, explains the importance of being able to identify truly green data centres as organisation’s develop their own sustainability objectives and also...
Alexander Troshin, EMEA Product and Marketing Manager, Enterprise and HPC Server at AMD, outlines the energy efficiency challenges facing the data centre industry, with particular reference to power-efficient...

Expert Opinions

By Max Alexander, co-founder at Ditto.
By Frank Baalbergen, Chief Information Security Officer, Mendix.
By Kelley Mullick, Vice President of Technology Advancement and Alliances, Iceotope.
By Dael Williamson, EMEA CTO at Databricks.