Novell announces strategic partnership with MobileIron for Secure Mobile File Access

Novell Filr integration with MobileIron AppConnect provides mobile users access to and ability to share files from any IT-approved device.

Read More


Beta release of Red Hat Enterprise Linux 6 now available

To keep pace with the demand for enterprise-class infrastructure, the newest version of the leading Linux platform, the beta release of Red Hat Enterprise Linux 6.5, extends its scalability and manageability to aid in the build-out and control of large, complex IT environments. For example, Red Hat Enterprise Linux 6.5 will be designed to simplify the operation of mission-critical SAP applications by automating the optimal configuration of common SAP deployments.

Read More



Global study shows need for C-level leadership

Capgemini Consulting, in partnership with MIT Sloan Management Review, has announced the findings of a new global research survey into Digital Transformation – the opportunity for radical business change offered by the convergence of new digital technologies such as social media, mobile, analytics, and embedded devices. The study, “Embracing Digital Technology: A New Strategic Imperative,” reveals that while the potential opportunity of Digital Transformation is absolutely...

Read More

By David Howell, European Director, ManageEngine.
Bit9 Security Platform v. 7.2, Carbon Black v. 4.2 and the new Threat Intelligence Cloud combine to...
Businesses are not doing enough to combat cyber risks despite an increased awareness of the need to...
CNI organisations demonstrate strong appetite for digital transformation but misplaced confidence...
Each year organizations increase spending on cyber security protection to keep their businesses,...
With SafeNet Encryption and Key Management solutions customers can securely share data in the...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more