Automating network vulnerability detection and security policy enforcement

SolarWinds has introduced enhancements to SolarWinds Network Configuration Manager (NCM), its network device configuration and change management product for Cisco, Juniper, HP, Dell, and Brocade routers and switches and any other device with a command line interface.

Read More
Cisco embeds security everywhere

Cisco has introduced new offerings to embed security throughout the extended network – from the data center out to endpoints, branch offices, and the cloud – for pervasive threat visibility and control. By integrating security everywhere, enterprises and service providers gain the...

Read More
Confidence and confusion surround network security

While most C-Level executives are sure their infrastructure is safe, many more admit that better security will only come with enhanced visibility into the network.

Read More
Nutanix launches Acropolis and Prism

Nutanix has unveiled its next-generation Xtreme Computing Platform (XCP) to deliver invisible...

Read More
Sophos adds email security

Acquisition of Reflexion Networks delivers effective and easy-to-use email security via the cloud.

Read More
IT operations insight

Kaseya has published the results of its IT operations benchmark survey which offers insight into...

Read More
BT secures cloud services integration offering with Check point software technologies

Embedded Cloud Firewall services to help customers move to cloud whilst minimising risk.

Read More
NEC awards Top Performers at NEC EMEA Partner Conference 2015

Conference celebrates sales success and radiates commitment to company’s strategy and...

Read More
Keys and certificates 'chaos'

Venafi has released the results of its 2015 RSA Conference survey, gathered from nearly 850 IT...

Read More
Gigamon and JDSU announce integration of Software Defined Visibility APIs

Gigamon says that JDSU is developing closed loop integration plugins that support Gigamon’s...

Read More
Social media - the security risk

New study reveals that social media security is a low priority for organisations and employees are...

Read More
Integrated threat response and intelligence platform

Leveraging leading global threat intelligence to accelerate cybersecurity response and containment...

Read More
Tenable Network Security extends capabilities of Nessus Agents

Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack...

Read More
Proofpoint extends targeted attack protection

Industry-leading advanced malware protection capabilities to secure users across LinkedIn,...

Read More

Videos

Katie Coulson, EVP & General Manager, Skanska Advanced Technology (SAT), talks about how Skanska approaches some of the most demanding construction projects in the data centre industry, thanks to its new...
Adam Pitton, Heimdal Security cybersecurity advisor and former UK cyber detective, discusses the findings of the company’s recent survey 80 North American MSPs, showing that fragmented security stacks drive...
Rob Finn, VP International Sales at Chainguard, discusses the company’s new Global Partner Program, offering flexible incentives, technical enablement, and go-to-market support to empower channel resellers...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, shares his thoughts on the future direction of BCDR and advice for MSPs to develop an optimised, comprehensive BCDR offering for SMBs.

Expert Opinions

By Kate Steele, Director, EMEA HPC/AI at Lenovo Infrastructure Solutions Group.
BY Jerry Fujii and Naoki Ueyama, Partners in the Tokyo office of Morgan Lewis.
By Subhashis Nath, AVP and Head of Analytics, Infosys.
Toni de la Fuente, CEO and Founder of Prowler, unpacks how AI is moving from a supplementary tool to a core layer of modern cloud defense.