Security enhancements for Thunder ADC portfolio

New features enable organizations to keep up with evolving security threats and compliance standards required to protect brand, intellectual property, and revenue.

Read More
Cisco report highlights weak links in increasingly dynamic threat landscape

The Cisco 2014 Midyear Security Report examines the "weak links" in organizations that contribute to the increasingly dynamic threat landscape. These weak links -- which could be outdated software, bad code, abandoned digital properties, or user errors -- contribute to the adversary's...

Read More
Alert Logic helps clckwrk secure business critical Oracle applications

Alert Logic Intrusion Detection and Log Management capabilities improve Oracle business application...

Read More
Six Degrees Group underpins UK public sector's building operations

Converged services provider’s infrastructure used by LHC to support procurement for 150...

Read More
IT security market grows

According to IT Security, a new Market Report from business intelligence provider Key Note, the UK...

Read More
Skilled Data Scientists in demand as job posts grow 1000%, says Rackspace

Rackspace, the managed cloud company, has thrown its weight behind the first ever Science to Data...

Read More
What is the future of cloud computing for SMEs?

Cloud has often been considered the future of enterprise IT but what about the smaller business?...

Read More
Integrated endpoint threat prevention, detection and response

Bit9 Security Platform v. 7.2, Carbon Black v. 4.2 and the new Threat Intelligence Cloud combine to...

Read More
Alert Logic announces security solutions for Google Cloud Platform

Alert Logic first to deliver IDS and log management capabilities to Google cloud customers.

Read More
Consumer confusion around Cloud technology

U.K. research released by Juniper Networks reveals that nearly one quarter of respondents (21.8...

Read More
The European General Data Protection Regulation – a major opportunity for cloud providers

New AIIM whitepaper highlights the potential to deliver EU-wide services under a single operations...

Read More
OpenStack Summit heads to Europe

For the first time, the OpenStack® Summit is coming to Europe. The 10th OpenStack Summit will...

Read More
375 million customer data records compromised in 2014

Identity theft main reason for breaches and survey shows 40 per cent of consumers very unlikely to...

Read More

Videos

Keith Young, Global Head of Last Mile Services at Arvato, explains how the recent entry into the US data centre market is the latest step in the strategic integration of ATC, the Irish logistics company that...
Rebecca Scottorn, Partner at L.E.K. Consulting and part of the global Industrials Practice, discusses the company’s recent ‘State of the Energy Industry’ report, providing valuable insights into a range...
Welcome to the WinStar Introductory Presentation!
Chris Gilmour, CTO of Axians UK, explains how Axians, the ICT brand of VINCI Energies, and Nokia are deepening their strategic collaboration to drive the next phase of communications infrastructure and mobile...

Expert Opinions

By Pete Wilson, Senior Director, Channel Sales EMEA, Illumio.
By Rohan Vaidyanathan - Vice President, Content Intelligence, Hyland.
By Shuaib Rabbani, Major Incident Management Product Owner at HaloITSM.
By Buddie Ceronie, GM for Telecommunications, VertiGIS.