HGST delivers VMware Virtual SAN support

HGST has introduced a broad portfolio of certified devices for VMware Virtual SAN™, VMware's software-defined storage product. The HGST hardware certification list includes 12Gb/s SAS solid state drives (SSDs), PCIe Flash accelerators, as well as performance and capacity hard disk drives...

Read More
Screenshot verification for VMware VM backups

NAKIVO Backup & Replication v5.6 provides the ability to instantly verify VMware VM backups by instantly recovering VMs from the compressed and deduplicated backup repository and sending a screenshot of the booted VMs as a proof of recoverability.

Read More
Dell unveils Citrix Desktop Virtualization Solution

New Dell Appliance for Wyse – Citrix enables smaller organisations to quickly deploy and manage desktop virtualization.

Read More
“Transform to Better Perform” initiative focuses on data centres and the Cloud

The Business Performance Innovation (BPI) Network, a Silicon Valley based organisation representing enterprise leaders, has launched a major campaign to explore business imperatives and IT trends reshaping the future of data centres and evolving hybrid IT models. The wide-reaching initiative will...

Read More
Italtel and Exprivia partner

Agreement follows ten years of collaboration and forms a joint bid for telecom infrastructure, OSS...

Read More
App Layering spanning all VDI platforms

Liquidware Labs has introduced ProfileUnity v6.5 with significantly enhanced FlexApp application...

Read More
Unitrends 'redefines' Free Virtualisation Backup 

Unitrends has released the public beta version of Unitrends Free™, a new addition to the...

Read More
UK IT leaders the most challenged in Europe… 

Research suggests UK companies will be using IT services providers the most to overcome hurdles in...

Read More
Virtual success for German Army

The German Army needs the ability to take military-grade, highly available storage with them...

Read More
BYOD is the new black – but how should IT policy support it?

By Paul Le Messurier, Programme and Operations Manager at Kroll Ontrack.

Read More
Enterprises are reducing their carbon footprint and IT investments via virtualization solutions

The turbulent global economic scenario has compelled enterprises to reduce their operational costs,...

Read More
Redefining IT performance and efficiency?

Major updates across XtremIO, VMAX3, VCE, VNX, Data Domain and Data Protection Suite portfolio.

Read More
A Digital Single Market for Europe: Commission sets out 16 initiatives to make it happen

The Internet and digital technologies are transforming our world – in every walk of life and...

Read More
Veeam Introduces Veeam FastSCP for Microsoft Azure and Veeam Management Pack v8 for System Center

Latest addition to Veeam’s family of free tools, Veeam FastSCP for Microsoft Azure provides...

Read More
Huawei launches new European Research Institute

Gearing up European digitisation progress and achieve win-win outcomes.

Read More

Videos

Cullen discusses the findings of the company’s recent 2026 SolarWinds State of Monitoring & Observability Report, examining how IT teams are navigating increasingly fragmented hybrid environments, and in...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...

Expert Opinions

By Anna Marie Clifton, Director of Product, AI and Agents, at Zapier.
By Sean Tilley, Senior Director of Sales EMEA at 11:11 Systems.
By Marcel Reifschneider-Hicker, Associate Director, BCS Consultancy.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...