A10 Networks and Webroot partner

A10 customers can satisfy security and regulatory requirements by decrypting SSL traffic while excluding traffic to regulated data and sensitive sites like banking and healthcare.

Read More
Security enhancements for Thunder ADC portfolio

New features enable organizations to keep up with evolving security threats and compliance standards required to protect brand, intellectual property, and revenue.

Read More
Voltage SecureData z/Protect provides reliable, standards-based protection of sensitive data on IBM mainframes

Voltage Security has announced significant enhancements to Voltage SecureData z/Protect™ that make it easy to implement and manage data protection on z/OS, natively and with full interoperability with other Voltage SecureData™ components. The new Voltage SecureData z/Protect continues...

Read More
Worldwide IT market showing tentative signs of improvement

According to the newly published International Data Corporation (IDC) Worldwide Black Book (Doc...

Read More
South Korea’s improving economic conditions boost ICT expenditure

Due to the improving economy and enhanced financial prospects in South Korea, enterprises embrace...

Read More
Cisco report highlights weak links in increasingly dynamic threat landscape

The Cisco 2014 Midyear Security Report examines the "weak links" in organizations that...

Read More
Alert Logic helps clckwrk secure business critical Oracle applications

Alert Logic Intrusion Detection and Log Management capabilities improve Oracle business application...

Read More
Validation update

Login VSI, Inc. announces Login VSI 4.1, a substantial update to its flagship product. Login VSI is...

Read More
IT security market grows

According to IT Security, a new Market Report from business intelligence provider Key Note, the UK...

Read More
OpenStack Summit heads to Europe

For the first time, the OpenStack® Summit is coming to Europe. The 10th OpenStack Summit will...

Read More
PCI Compliance contributes to false sense of security

Tripwire, Inc. has announced the combined results of a 2014 retail cybersecurity survey conducted...

Read More
Alert Logic announces security solutions for Google Cloud Platform

Alert Logic first to deliver IDS and log management capabilities to Google cloud customers.

Read More
Integrated endpoint threat prevention, detection and response

Bit9 Security Platform v. 7.2, Carbon Black v. 4.2 and the new Threat Intelligence Cloud combine to...

Read More
Securing your virtual environment

By David Phillips, product manager, Wick Hill.

Read More

Videos

Nicolas Leszczynski, Principal Solutions Engineer at Riverbed Technology, discusses the findings of the company’s 2025 Future of IT Operations in the AI Era report. Despite record investments, only 12% of AI...
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...
Conrad Purcell, partner at Haynes Boone, explains how data centre development in sub-Saharan Africa is accelerating, driven by rising digital demand and infrastructure investment. While project finance through...
Jim Lippie, Chief Product Officer, Kaseya, discusses the recent Kaseya DattoCon 2025 conference, where the company unveiled its latest innovations and previewed its next generation cyber resilience and digital...

Expert Opinions

By Lizzy McDowell, Director of Marketing, Kao Data.
By Pete Wilson, Senior Director, Channel Sales EMEA, Illumio.
AI’s true value starts with the right mindset. By Darin Patterson, VP of Market Strategy Make.
Straightline Consulting’s Craig Eadie discusses how the rapid rise of hyperscale and AI-driven data centres is amplifying project complexity and risk, and why comprehensive commissioning from day one is now...