Zendesk obtains European BCR approval

Becomes just the second company ever to receive Binding Corporate Rules (BCR) approval through Irish Data Protection Commissioner (DPC).

Read More
Latest Red Hat Ceph Storage release expands versatility as object store

Newest version of storage platform broadens protocol support to extend flexibility of object storage deployments for traditional and modern workloads.

Read More
MapR-XD extends Converged Data Platform to create cloud-scale data fabric

Manages files, containers at multiple temperature, across edge, on-premises and multiple clouds.

Read More
Imperva CounterBreach 2.0 introduces Machine Learning algorithm

Addresses permissions management failings in knowledge-driven work environments.

Read More
vSCOUT, vSTREAM and virtual nGeniusONE extend Netscout’s service assurance capabilties

NETSCOUT has introduced the industry’s first products designed to extend service assurance that...

Read More
Alteryx acquires Yhat

Alteryx has acquired Yhat, Inc., a data science software company headquartered in Brooklyn, New...

Read More
Scality cracks enterprise cloud security anxieties

Scality has introduced Scality RING7, its new appliance-inspired multi-site scale-out filesystem...

Read More
Ipswitch extends secure file transfer and network monitoring software

Ipswitch has strengthened the ability of IT teams to meet the data security and performance...

Read More
Major gaps in security strategies

Endpoint security seen as key to more integrated approach.

Read More
Unifying security enforcement across the entire enterprise

Juniper Networks has introduced enhancements to its Software-Defined Secure Networks (SDSN)...

Read More
iland achieves Cloud Security Alliance STAR Gold Certification

iland has achieved the Cloud Security Alliance (CSA) STAR Certification, becoming only the second...

Read More

Videos

In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...

Expert Opinions

The Opportunities & Engineering Challenges Of Quantum Computing Within A Data Centre Environment – Taking learnings from other industries By Matthew Martin, Managing Director, Quantum Design Oxford.
By Derek Thompson, Senior VP & GM, EMEA, Workato.
IDTechEx Technology Analyst Noah El Alami discusses the potential of the new generation of nuclear technologies – fission small modular reactors (SMRs) and fusion energy – in powering the ever-increasing...