Gigamon unveils Software Defined Visibility 

Gigamon has unveiled Software Defined Visibility – a framework that allows customers, security partners, managed service providers and others to automate detection, reaction and response to threats and programmatically adapt security policies to network changes.

Read More
tray.io announces $2.2m series seed funding

tray.io, the company that makes connecting software services a breeze, has closed a $2.2 million Series Seed round of funding. The funding round was led by True Ventures, with participation from Redpoint Ventures and Angelpad. This fresh round of financing follows an initial $600,000 raised from...

Read More
A10 Networks works with RSA Security

 A10 Networks has collaborated with RSA, The Security Division of EMC, to help increase security capabilities for joint customers. Through its RSA® Ready Technology Partner Program, RSA has validated interoperability with A10 Thunder Application Delivery Controller’s (ADC) innovative...

Read More
VMware introduces Open Source projects

VMware has revealed two new open source projects built to enable enterprise adoption of cloud-native applications – Project Lightwave, an identity and access management project that will extend enterprise-scale and security to cloud-native applications; and Project Photon, a lightweight Linux...

Read More
Check Point and FireEye form partnership

Partnership will provide joint customers with largest set of actionable threat intelligence in the...

Read More
Lancope launches ProxyWatch

New solution extends network visibility to both sides of a proxy conversation for advanced threat...

Read More
Queensway Park gets green light for £100 million Fife data centre campus

Detailed consent has been granted for phase one of the country’s largest green data centre...

Read More
Cavium introduces LiquidSecurity

Cavium has introduced the LiquidSecurity™ Hardware Security Module (HSM) Family, a complete...

Read More
Ten things you didn’t know about rack PDUs

Do you want to accurately monitor and control energy usage in your IT installation? Do you want to...

Read More
Black Hole Routing does not equate to DDoS protection

By Stephen Gates, Chief Security Evangelist for Corero Network Security.

Read More

Videos

Nigel Hedges, Application and Technical Specialist at Fluke Networks explains that, as fibre density increases and performance margins tighten; driven by AI, cloud, and next-generation digital infrastructure,...
Denis Schertenleib, Nexthink’s Senior Director of Product, believes that the IT service desk won’t survive the next five years and that agentic AI will be the future of IT support. He also discusses...
Brandon Smith, VP of Global Sales and Product at ZincFive, how AI workloads are fundamentally changing data centre power profiles - shifting from steady, predictable loads to highly dynamic, burst-driven...
Unveiling the science of nickel-zinc (NiZn) batteries. In this video we break down the advantages behind our remarkable chemistry. Discover the key factors that contribute to NiZn's exceptional power, safety,...

Expert Opinions

By Paul Speciale, Chief Marketing Officer at Scality.
By Christopher Butler, President, Embedded and Critical Power.
Mike Hoy, CTO, Pulsant, and Mike Hellers, Product Development Manager, LINX, on how hosting data locally in Scotland supports optimal speeds and reliability, complementing wider UK connectivity for consistent...
By Fiona Reid, Director of International Business at Pattern