HP unveils data-centric security protection enhancements  

New enterprise data security offerings from HP Atalla and HP Security Voltage address collaboration, PCI compliance and scope reduction.

Read More
Gallagher's security solutions chosen for World Trade Center

Gallagher's PIV Solution will be installed for two Federal agencies residing at the World Trade Center. Purpose built for the U.S. Federal market, Gallagher's PIV (Personal Identity Verification) Solution delivers state-of-the-art security architecture with the fastest form of...

Read More
IBM and ARM collaborate

IBM is expanding its Internet of Things (IoT) platform – called IBM IoT Foundation - through an integration with ARM, providing out of the box connectivity with ARM® mbedTM-enabled devices to analytics services. This fusion will allow huge quantities of data from devices such as...

Read More
The silent killer of VM performance

By Brian Morin, Global SVP of Marketing, Condusiv Technologies.

Read More
Healthcare in the Cloud

By Jack Bedell-Pearce, Managing Director, 4D.

Read More
VMware previews vSphere Integrated Containers and Photon Platform

VMware has introduced two new technology previews -- VMware vSphere Integrated Containers and...

Read More
VMware unveils end-user computing innovations 

VMware has introduced new End-User Computing innovations for universal application delivery and...

Read More
The University of York tackles application delivery challenges with Dell Wyse vWorkspace

Academics and students access essential legacy applications quickly and securely.

Read More
Telefónica chooses Juniper Networks 

Telefónica Spain has selected Juniper Networks® MX Series 3D Universal Edge Routers to...

Read More
Shining the light on Shadow IT is critical to understanding unauthorised application usage in the enterprise, says M-Files

Understanding the scale and magnitude of the use of unauthorised applications across the enterprise...

Read More
Helping to reduce backup and archiving costs

Fujitsu storage ETERNUS CS8000, the compelling choice for unified data protection, is further...

Read More

Videos

Eric Herzog, Chief Marketing Officer at Infinidat, explains how enterprises should be thinking about their cyber security strategy today, the difference between the next-generation and traditional approaches...
Meredith Kendrick, Product Line Manager at AFL, explains the company’s DENALI platform – with a particular focus on how it supports increasing fibre density demands in rapidly evolving, GPU-intensive fibre...
Steve Wilson, Chief AI and Product Officer at Exabeam, discusses the company’s recent report, From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025, explaining that there’s no shortage...
Amber Walsh, Senior Analyst at Bluefield Research, discusses the findings of the company’s new report, U.S. Water for Data Centers: Market Trends, Opportunities, and Forecasts, 2025–2030, which reveals...

Expert Opinions

In the rush to embrace cloud-first strategies, data security has become dangerously misunderstood, and the result is a fragmented, chaotic environment that’s starting to feel like the Wild West.
By David Knox, Global Director of Energy & Sustainability at Colt DCS.
By David Higgins, Senior Director, Field Technology Office, CyberArk.
The Middle East is undergoing a huge shift in its engineering and infrastructure sectors, with chapmanbdsp perfectly poised at the centre of the region’s transformation.