BeyondTrust expands EMEA channel focus in 2015

New senior executive appointment, updated partner portal, training and certification enhancements will help to hit 100% channel revenue target.

Read More
Cyber threat portal

Tier-3 Huntsman has launched Analyst Portal, that enables automated investigation, validation and resolution of cyber threats. It improves the accuracy of decisions, optimises the diagnosis of the nature of attacks, enhances the efficiency of security operations teams and reduces the time at risk...

Read More
NEWS
Herjavec Group expands Into Europe

Herjavec Group has acquired Sysec™, an IT security solutions provider headquartered in the United Kingdom and the 2014 McAfee EMEA Accredited Certified Engineer (ACE) Partner of the Year. 

Read More
NEWS
Automating access management, a tops among 2015’s IT trends

By Robert Doswell, managing director of Tools4ever UK, a global provider of identity and access...

Read More
Organisations report better security policy implementation, improved technologies and growing financial commitment

With every email now a target and every piece of data at risk, the need for data protection...

Read More
EXIN expands its security portfolio

EXIN Holding BV and Security Academy BV are very pleased to strengthen their partnership in the...

Read More
Clavister launches entry-level W20 firewall

Latest addition to the Clavister Wolf Series products complements Clavister W3 and Clavister W5...

Read More
MicroStrategy unveils powerful new platforms for enterprise analytics, enterprise mobility, and enterprise security

MicroStrategy® Incorporated has announced the availability of MicroStrategy 9s, bringing...

Read More
A single DDoS attack can cost a company more than $400,000

According to the results of a study conducted by Kaspersky Lab and B2B International, a DDoS attack...

Read More
2015 Tech M&A on a path to continue record-setting spending of 2014

M&A Outlook Report cites bullish sentiment from bankers and acquirers among the factors that...

Read More
Arbor Networks 10th Annual Worldwide Infrastructure Security Report finds 50X increase in DDoS attack size in past decade

Size, complexity and frequency of attacks continue to rise, customer infrastructure and data...

Read More
Critical infrastructure executives complacent about Internet of Things security

24 percent of critical infrastructure employees have already connected an Internet of Things device...

Read More
Dell SecureWorks launches Advanced Malware Protection and Detection Service

Dell SecureWorks has launched a new service to help organisations detect and protect against...

Read More
Companies need to stop divorcing themselves from cyber security

The 2015 Data Protection Best Practices and Risk Assessment Guides has revealed that in January to...

Read More

Videos

Johan van Hover, Business Manager at Arteco Coolants, outlines the company’s history as a joint venture between Chevron and TotalEnergies and its reputation for high performance coolant technologies,...
Andrew Batson, Head of U.S. Data Center Research at JLL, explains how the North America data centre colocation market has reached a critical tipping point, with vacancy rates plummeting to an unprecedented...
Katie Coulson, EVP & General Manager, Skanska Advanced Technology (SAT), talks about how Skanska approaches some of the most demanding construction projects in the data centre industry, thanks to its new...
David Rimmer, Microgrid Business Leader UK&I at Schneider Electric, outlines the ways in which data centre microgrid deployments can contribute to energy cost savings, energy resilience and independence, and...

Expert Opinions

By Jason Bayton, Android Enterprise Expert and Product Lead at NinjaOne.
Many UK businesses are still reeling from last year’s global IT outage that brought systems to a standstill. This was a stark reminder of how reliant businesses have become on third-party systems and the...
By Peter Ollerenshaw, Cloud Solutions Advisor at Cybit.
As more organisations become reliant on cloud-based network services, the traditional perimeter-based security model is becoming increasingly outdated. Keeping security measures updated is crucial in...