Ipswitch extends secure file transfer and network monitoring software

Ipswitch has strengthened the ability of IT teams to meet the data security and performance management challenges of today’s hybrid environment.

Read More
Major gaps in security strategies

Endpoint security seen as key to more integrated approach.

Read More
Unifying security enforcement across the entire enterprise

Juniper Networks has introduced enhancements to its Software-Defined Secure Networks (SDSN) platform to deliver pervasive security across multi-vendor environments, public clouds and private clouds. Powered by automated enforcement, real-time intelligence and machine learning, SDSN knows...

Read More
iland achieves Cloud Security Alliance STAR Gold Certification

iland has achieved the Cloud Security Alliance (CSA) STAR Certification, becoming only the second public cloud service provider (CSP) to hold this gold rating.

Read More
EfficientIP assists UK’s fifth largest university in tackling a connected devices surge

Metropolitan Manchester University achieves efficiency and productivity with SOLIDserver.

Read More
Keoghs opts for RAPID case processing

Leading defendant law firm, Keoghs, has invested in its IT and transformed the processing of...

Read More
NetApp addresses the hybrid Cloud world

Unveils NetApp HCI, the industry’s first enterprise-scale hyper converged solution that...

Read More
NEWS
The global data centre is coming

Aruba launches the largest data centre campus in Italy.

Read More
Processing the rising tide of encrypted internet traffic

A10 Networks has introduced third-generation SSL/TLS hardware solutions to help organisations...

Read More
NEWS
Attacks focus on people as well as their technology

Proofpoint has published its annual Human Factor report findings, which detail that...

Read More
Leadership crisis in digital transformation

Only 50% of companies are successfully executing on their digital transformation strategies...

Read More
Trojan Horse warning

New DDoS Trends and Analysis Report warns of “Trojan Horse” DDoS Attacks intended to disrupt...

Read More

Videos

Rebecca Scottorn, Partner at L.E.K. Consulting and part of the global Industrials Practice, discusses the company’s recent ‘State of the Energy Industry’ report, providing valuable insights into a range...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Heiko Ludwig, Global Head of Structure Finance at NORD/LB, discusses the findings of the company’s recent report, ‘Power Struggle: Meeting the challenge of financing data centres and the energy...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...

Expert Opinions

By Martin Jakobsen, Managing Director, Cybanetix
By Mark Daley, Director of Digital Strategy and Business Development, Epsilon Telecommunications.
By Richard Mitchell, Head of Channel, ThreatAware