Blue Coat launches Encrypted Traffic Management Ready Certification Program

ETM Ready will generate best-in-class solutions for combating security threats hidden in encrypted traffic.

Read More
Overcoming the mobile password 'pain point'

True Key solves the problem of remembering multiple passwords and gives users greater control of their online identities .

Read More
NEWS
Engage digitally, or die!

Organisations that don’t embrace digital customer engagement channels – that’s web chat, social media, SMS, smart phones and mobile applications, and even video - into their engagement strategies within the next two years, are likely to see their customers jump ship to competitors...

Read More
Resilient Systems expands in EMEA

Senior hires, including Paul Ayers as General Manager EMEA, and opening of a European HQ will...

Read More
BMC and Qualys join forces to improve enterprise security

Integrated solution combines BMC BladeLogic and Qualys Vulnerability Management to quickly identify...

Read More
Security integrated into RTOS

Kaspersky Lab and SYSGO have showcased a security solution for safety-critical tasks which embeds...

Read More
Fortinet FortiSandbox catches Zero-Day and Advanced Threats

Fortinet has launched FortiSandbox 2.0, delivering enhanced features to their top-rated...

Read More
NEWS
Tenable unveils Nessus Cloud

Tenable launches Nessus Cloud to deliver world-class vulnerability management capabilities for SaaS...

Read More
NEWS
McAfee Labs finds mobile apps left vulnerable for months

Intel Security has released its McAfee Labs Threats Report: February 2015, including assessments of...

Read More
NEWS
Enterprise IT is losing control over business data

Survey of IT decision makers collectively managing more than 250,000 users finds that as the...

Read More
NEWS
Five key IT security trends for 2015

Ian Kilpatrick, chairman Wick Hill Group, specialists in secure IP infrastructure solutions, looks...

Read More
NEWS
Security fears stop firms using cloud computing services

New research from the Federation of Small Businesses (FSB) has found that despite three fifths...

Read More
 Privileged Identity Management for Big Data

Centrify Corporation has launched what it says is the industry’s first privileged identity...

Read More
Check Point acquires Hyperwise

Acquisition of stealth-mode start-up enhances threat prevention portfolio to stop attacks before...

Read More

Videos

DCW Asia 2025 - Part 1 of 3
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
In this interview, Eric Mink, VP of AI Adoption, shares how MSPs can turn AI curiosity into structured, billable services. He explores commercialisation strategies, vertical specialisation, and building...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...

Expert Opinions

By Markus Nispel, Head of AI Engineering & EMEA CTO, Extreme Networks.
By Simon Seymour-Perry, CEO of Logica Security.
By Federica Monsone, CEO and founder, A3 Communications - the data storage industry PR agency.