Seamless physical to virtual (P2V) migration

ExtraHop Networks, a provider of IT operational intelligence solutions, announces a deal with Trader Media Group, publisher and owner of Auto Trader, a leading motoring website and magazine in the United Kingdom that contributed more than £257 million in annual revenue for 2012.

Read More
Shadow IT lurks uncomfortably, for IT departments

The growth in ‘Shadow IT’ is leaving IT departments caught between a rock and a hard place, according to Simon Bain, CTO of search specialists, Simplexo, who suggests that the concerns existing around managing unsupported devices are equally matched by the need to bring IT expenditure...

Read More
New survey highlights worrying lack of guidance from employers on use of personal devices

A survey commissioned by the Information Commissioner’s Office (ICO) has shown many employers...

Read More
Introducing the Electronics Disposal Efficiency metric

The Green Grid launches first-of-its-kind metric to help organisations measure the responsible...

Read More
Opengear enhances Virtual Serial Port connectivity

Opengear has upgraded its Opengear virtual serial port software through a new partnership with...

Read More
Making the move to modern data protection

Veeam launches campaign to help organisations make the move to Modern Data Protection.

Read More
World premiere for DataCore VDS

At CeBIT 2013, DataCore Software is showcasing the latest advances in its SANsymphony™-V...

Read More

Videos

Daniel Reeves, CEO of The Computer Clinic Bicester, shares how the business has evolved from its roots into a modern IT services provider supporting both consumers and organisations. He discusses shifting...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...

Expert Opinions

Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...
By Chris Carreiro, Chief Technology Officer, Park Place Technologies.
By Brett Candon, VP International, Dropzone AI.