Sitzt IT mit am Tisch oder nur im Keller?

In den Unternehmen vollzieht sich ein Umbruch: IT nimmt eine neue Rolle ein. Anstatt Dienstleister zu sein, wird sie künftig Verantwortung für die Wertschöpfung übernehmen

Read More
Coming standards for mobiles combine ID security and ease of use

NAPPS and SCIM are two new standards due to appear over the next eighteen months which will both strengthen and enrich the services that spring off the back of using Single Sign-On ID management on mobile devices

Read More
Unified Threat Management was main driver of the EMEA Security Appliance market
  • Published in

According to the International Data Corporation (IDC) Europe, Middle East and Africa Quarterly Security Appliance Tracker, 4Q14 vendor revenue for the EMEA security appliance market reached $688.5 million, a 0.4% decrease over the same quarter a year ago. Shipments declined by 8.7% year on year...

Read More
Server revenues fall further in EMEA

According to the latest EMEA Server Tracker from International Data Corporation (IDC), factory...

Read More
Consortium launches three-year project to boost energy efficiency of urban data centres

The European Commission has awarded a €2.9m grant to a consortium of manufacturers, users, and...

Read More
Tech Mahindra to manage end-to-end IT infrastructure for Volvo Car Group

Global data centre, 4,000 factory devices, 2,800 servers to be managed and supported.

Read More
Weserve B.V. selects Flexiant to replace existing Cloud platform

Flexiant able to support Weserve’s multi-datacenter requirements.

Read More
Tegile Systems ships 1,000th Zebi Array

Tegile Systems has shipped its 1,000th Zebi™ storage array since making the solution...

Read More
Simplifying the growing complexity of email management

SolarWinds has announced its continued commitment to providing greater application visibility to...

Read More
GroundWork partners with Quru

GroundWork, a leading Unified Monitoring solution for IT operations management, virtualisation and...

Read More
Arbor applies analytics to security

Available as a cloud-delivered service or for on-premise use, Arbor’s Pravail Security...

Read More

Videos

Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...
Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Aleksandar Grbić, Global Data Center Solutions Manager, Hitachi Energy, discusses how the electricity grid must evolve to handle soaring demand from AI data centres. Grid integration and grid resilience have...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...

Expert Opinions

By Rick Vanover, Vice President, Product Strategy at Veeam.
By Dan Bridges, Technical Director, Dropzone AI.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
Neal Griffiths, Chief Experience Officer at Matrix Booking explores how human-centred design, underpinned by evidence and empathy, is redefining how organisations create flexible, inclusive and high-performing...