Gigamon unveils Software Defined Visibility 

Gigamon has unveiled Software Defined Visibility – a framework that allows customers, security partners, managed service providers and others to automate detection, reaction and response to threats and programmatically adapt security policies to network changes.

Read More
tray.io announces $2.2m series seed funding

tray.io, the company that makes connecting software services a breeze, has closed a $2.2 million Series Seed round of funding. The funding round was led by True Ventures, with participation from Redpoint Ventures and Angelpad. This fresh round of financing follows an initial $600,000 raised from...

Read More
A10 Networks works with RSA Security

 A10 Networks has collaborated with RSA, The Security Division of EMC, to help increase security capabilities for joint customers. Through its RSA® Ready Technology Partner Program, RSA has validated interoperability with A10 Thunder Application Delivery Controller’s (ADC) innovative...

Read More
VMware introduces Open Source projects

VMware has revealed two new open source projects built to enable enterprise adoption of cloud-native applications – Project Lightwave, an identity and access management project that will extend enterprise-scale and security to cloud-native applications; and Project Photon, a lightweight Linux...

Read More
Check Point and FireEye form partnership

Partnership will provide joint customers with largest set of actionable threat intelligence in the...

Read More
Lancope launches ProxyWatch

New solution extends network visibility to both sides of a proxy conversation for advanced threat...

Read More
Queensway Park gets green light for £100 million Fife data centre campus

Detailed consent has been granted for phase one of the country’s largest green data centre...

Read More
Cavium introduces LiquidSecurity

Cavium has introduced the LiquidSecurity™ Hardware Security Module (HSM) Family, a complete...

Read More
Ten things you didn’t know about rack PDUs

Do you want to accurately monitor and control energy usage in your IT installation? Do you want to...

Read More
Black Hole Routing does not equate to DDoS protection

By Stephen Gates, Chief Security Evangelist for Corero Network Security.

Read More

Videos

In this interview, Gal Yosef, Director of Solution Engineering at AlgoSec, discusses how AI is reshaping both cyber threats and defences, and why visibility, policy enforcement and operational discipline are...
Dan Wensley, CEO of the Global Technology Industry Association (GTIA), discusses how MSPs must collaborate as AI adoption accelerates across the industry. He explains why community, peer learning, and open...
Howard Pheby, newly appointed Chief Commercial Officer at Stellanor, explains how the company is building something different: urban colocation that serves enterprises where they actually operate, backed by...
Phil Cullerton, VP Services EMEA at Vertiv, explains why services will define the future of the data centre. The future of the data centre is not just about who builds fastest, it is about who operates best....

Expert Opinions

By Dan Bridges, Technical Director, Dropzone AI.
By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.
By Robert Hannigan, Chairman of International Business at BlueVoyant.