Gigamon unveils Software Defined Visibility 

Gigamon has unveiled Software Defined Visibility – a framework that allows customers, security partners, managed service providers and others to automate detection, reaction and response to threats and programmatically adapt security policies to network changes.

Read More
tray.io announces $2.2m series seed funding

tray.io, the company that makes connecting software services a breeze, has closed a $2.2 million Series Seed round of funding. The funding round was led by True Ventures, with participation from Redpoint Ventures and Angelpad. This fresh round of financing follows an initial $600,000 raised from...

Read More
A10 Networks works with RSA Security

 A10 Networks has collaborated with RSA, The Security Division of EMC, to help increase security capabilities for joint customers. Through its RSA® Ready Technology Partner Program, RSA has validated interoperability with A10 Thunder Application Delivery Controller’s (ADC) innovative...

Read More
VMware introduces Open Source projects

VMware has revealed two new open source projects built to enable enterprise adoption of cloud-native applications – Project Lightwave, an identity and access management project that will extend enterprise-scale and security to cloud-native applications; and Project Photon, a lightweight Linux...

Read More
Check Point and FireEye form partnership

Partnership will provide joint customers with largest set of actionable threat intelligence in the...

Read More
Lancope launches ProxyWatch

New solution extends network visibility to both sides of a proxy conversation for advanced threat...

Read More
Queensway Park gets green light for £100 million Fife data centre campus

Detailed consent has been granted for phase one of the country’s largest green data centre...

Read More
Cavium introduces LiquidSecurity

Cavium has introduced the LiquidSecurity™ Hardware Security Module (HSM) Family, a complete...

Read More
Ten things you didn’t know about rack PDUs

Do you want to accurately monitor and control energy usage in your IT installation? Do you want to...

Read More
Black Hole Routing does not equate to DDoS protection

By Stephen Gates, Chief Security Evangelist for Corero Network Security.

Read More

Videos

Robert Tanner, Locker & Vending Solutions Specialist at LapSafe, discusses the AI Smart Locker, which recently won ‘AI & Automation Project of the Year’ at the MSP Channel Awards. He explains how the...
Adhum Carter Wolde-Lule, Director at Prism Power Group, highlights the fact that switchgear is fast becoming one of the biggest hidden constraints in UK (and elssehwere) commercial construction - with data...
In this interview, Jack Cooke, Senior Director of Global Partner Programs at Inforcer, discusses how MSPs are evolving in response to AI, security and the growing complexity of the Microsoft ecosystem. He...
Katie Coulson, Executive Vice President and General Manager, Skanska Advanced Technology, discusses the many factors which need to be considered when delivering a data centre design and build, including the...

Expert Opinions

By Sham Arora, Chief Technology Officer at Tech Mahindra.
By: Brian Kreidler, Team Leader Project Engineering, ZIEHL-ABEGG Inc.
By Graham Jarvis, Freelance Lead Journalist, Business and Technology, Trudy Darwin Communications, for Bridgeworks Ltd.
By Michelle Brophy, Director of Research, Tech, Media & Telecom at AlphaSense.