Novell announces strategic partnership with MobileIron for Secure Mobile File Access

Novell Filr integration with MobileIron AppConnect provides mobile users access to and ability to share files from any IT-approved device.

Read More


Beta release of Red Hat Enterprise Linux 6 now available

To keep pace with the demand for enterprise-class infrastructure, the newest version of the leading Linux platform, the beta release of Red Hat Enterprise Linux 6.5, extends its scalability and manageability to aid in the build-out and control of large, complex IT environments. For example, Red Hat Enterprise Linux 6.5 will be designed to simplify the operation of mission-critical SAP applications by automating the optimal configuration of common SAP deployments.

Read More



Global study shows need for C-level leadership

Capgemini Consulting, in partnership with MIT Sloan Management Review, has announced the findings of a new global research survey into Digital Transformation – the opportunity for radical business change offered by the convergence of new digital technologies such as social media, mobile, analytics, and embedded devices. The study, “Embracing Digital Technology: A New Strategic Imperative,” reveals that while the potential opportunity of Digital Transformation is absolutely...

Read More

Proofpoint has introduced what it says is the industry’s first integrated, end-to-end solutions...
The UK has a higher instance of being a victim of ransomware attacks than any other country...
A10 Networks has introduced third-generation SSL/TLS hardware solutions to help organisations...
Bromium’s Protected App builds a wall around critical applications on the endpoint and secures...
Cloud-based video surveillance company Cloudview has published new research showing that, while the...
Chosen as leading supplier to provide cyber monitoring and detection under proof-of-concept...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more