Gigamon unveils Software Defined Visibility 

Gigamon has unveiled Software Defined Visibility – a framework that allows customers, security partners, managed service providers and others to automate detection, reaction and response to threats and programmatically adapt security policies to network changes.

Read More
tray.io announces $2.2m series seed funding

tray.io, the company that makes connecting software services a breeze, has closed a $2.2 million Series Seed round of funding. The funding round was led by True Ventures, with participation from Redpoint Ventures and Angelpad. This fresh round of financing follows an initial $600,000 raised from...

Read More
A10 Networks works with RSA Security

 A10 Networks has collaborated with RSA, The Security Division of EMC, to help increase security capabilities for joint customers. Through its RSA® Ready Technology Partner Program, RSA has validated interoperability with A10 Thunder Application Delivery Controller’s (ADC) innovative...

Read More
VMware introduces Open Source projects

VMware has revealed two new open source projects built to enable enterprise adoption of cloud-native applications – Project Lightwave, an identity and access management project that will extend enterprise-scale and security to cloud-native applications; and Project Photon, a lightweight Linux...

Read More
Check Point and FireEye form partnership

Partnership will provide joint customers with largest set of actionable threat intelligence in the...

Read More
Lancope launches ProxyWatch

New solution extends network visibility to both sides of a proxy conversation for advanced threat...

Read More
Queensway Park gets green light for £100 million Fife data centre campus

Detailed consent has been granted for phase one of the country’s largest green data centre...

Read More
Cavium introduces LiquidSecurity

Cavium has introduced the LiquidSecurity™ Hardware Security Module (HSM) Family, a complete...

Read More
Ten things you didn’t know about rack PDUs

Do you want to accurately monitor and control energy usage in your IT installation? Do you want to...

Read More
Black Hole Routing does not equate to DDoS protection

By Stephen Gates, Chief Security Evangelist for Corero Network Security.

Read More

Videos

Robert Tanner, Locker & Vending Solutions Specialist at LapSafe, discusses the AI Smart Locker, which recently won ‘AI & Automation Project of the Year’ at the MSP Channel Awards. He explains how the...
John Shultz, Chief Product Officer, AI and Learning Officer for Salute, discusses the company’s collaboration with Ecolab, enabling customers to protect their AI investments by reducing complexity and...
Tim Collier, director and UK data centre lead at Turner & Townsend, explains what’s needed to build confidence in the industry and to deliver data centres on schedule, how to navigate heightened competition...
Mark Banfield, Chief Revenue Officer at TeamViewer, discusses how the company is using its Tia (TeamViewer Intelligent Assistant) and a ‘shift left’ approach to move IT support from reactive to more...

Expert Opinions

By Aurore Knight, Associate Director, Black & White Engineering.
By Sham Arora, Chief Technology Officer at Tech Mahindra.
Implemented a phased replacement and migration of Hill Dickinson’s Wide Area Network (WAN) and security infrastructure.
By Alexandra Thorer, Chief Growth Officer at BCS Consultancy.