Gigamon unveils Software Defined Visibility 

Gigamon has unveiled Software Defined Visibility – a framework that allows customers, security partners, managed service providers and others to automate detection, reaction and response to threats and programmatically adapt security policies to network changes.

Read More
tray.io announces $2.2m series seed funding

tray.io, the company that makes connecting software services a breeze, has closed a $2.2 million Series Seed round of funding. The funding round was led by True Ventures, with participation from Redpoint Ventures and Angelpad. This fresh round of financing follows an initial $600,000 raised from...

Read More
A10 Networks works with RSA Security

 A10 Networks has collaborated with RSA, The Security Division of EMC, to help increase security capabilities for joint customers. Through its RSA® Ready Technology Partner Program, RSA has validated interoperability with A10 Thunder Application Delivery Controller’s (ADC) innovative...

Read More
VMware introduces Open Source projects

VMware has revealed two new open source projects built to enable enterprise adoption of cloud-native applications – Project Lightwave, an identity and access management project that will extend enterprise-scale and security to cloud-native applications; and Project Photon, a lightweight Linux...

Read More
Check Point and FireEye form partnership

Partnership will provide joint customers with largest set of actionable threat intelligence in the...

Read More
Lancope launches ProxyWatch

New solution extends network visibility to both sides of a proxy conversation for advanced threat...

Read More
Queensway Park gets green light for £100 million Fife data centre campus

Detailed consent has been granted for phase one of the country’s largest green data centre...

Read More
Cavium introduces LiquidSecurity

Cavium has introduced the LiquidSecurity™ Hardware Security Module (HSM) Family, a complete...

Read More
Ten things you didn’t know about rack PDUs

Do you want to accurately monitor and control energy usage in your IT installation? Do you want to...

Read More
Black Hole Routing does not equate to DDoS protection

By Stephen Gates, Chief Security Evangelist for Corero Network Security.

Read More

Videos

Jesse Todd, CEO of EncompaaS, explains that as data volumes explode and AI evolves at a rapid pace, ignoring unstructured data is no longer an option. Intelligent information management platforms help...
Jesse Todd, CEO of EncompaaS, explains that as data volumes explode and AI evolves at a rapid pace, ignoring unstructured data is no longer an option. Intelligent information management platforms help...
Jason Feist, senior vice president of cloud marketing, Seagate, discusses the findings of the company’s recent Decarbonizing Data report, which highlights the growing sustainability challenges facing data...
Sal King, Channel Sales Manager for the UK and Ireland at Scalefusion, discusses the company’s expansion into a new region as part of the company’s commitment to meeting the growing demand for enterprise...

Expert Opinions

By Nigel Edwards, Vice President WW Channel Sales & Marketing at Western Digital.
By Irvin Shillingford, Hornetsecurity’s Regional Manager for the UK, Benelux, and Nordic Regions.
By Shahar Belkin, Chief Evangelist at ZutaCore.