NEWS

LogPoint releases LogPoint 7

Comprehensive update provides best-in-class SIEM and SOAR integration within one unified security operations platform for accelerated detection, investigation, and response.

Read More

NEWS

AvePoint launches Confide

New product addresses the growing need to protect sensitive data, without sacrificing efficiency.

Read More

VIDEO

Helping the Channel negotiate the BC/DR ‘maze’

Richard May, Managing Director of virtualDCS, offers some great insights as to the challenges and opportunities for the Channel as it seeks to help its customers address their business continuity/disaster recovery needs. In a market where many continue to hold on to the ‘comfort’ of legacy applications, Richard believes that the virtualDCS CloudCover solutions portfolio, built around the company’s longstanding partnership with Veeam, offers a great opportunity for Channel companies to...

Read More

VIDEO

Apple devices in the security spotlight - Addigy interview

Addigy’s Founder and CEO, Jason Dettbarn, explains how Apple devices are attracting increasing levels of security attacks, and what measures the company takes to counter these threats, as well as outlining how Addigy can help its customers to be confident and secure when using its Apple-based solutions.

Read More



Nearly four in ten (38 percent) cloud migrations aimed to improve security.
The worldwide public cloud services market is projected to grow 17.5 per cent in 2019 to total...
Research from Sungard Availability Services® finds that over half of retailers lack the necessary...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...
54% of organisations working on a security transformation project now or in the next 12 months.
By Ian Tickle, ‎VP EMEA, SaaS Solutions at Oracle Corporation, looks at how the cloud...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more