Båstad selects ultra-compact data centre solution from Proact

Proact has been selected by Båstad Municipality in Sweden to deliver and deploy its new IT infrastructure. The core of the municipality’s data centre will be replaced by a novel solution with minimal space requirements. This will conserve energy, enhance reliability and facilitate support and daily IT operations.

Read More

2015 Tech M&A on a path to continue record-setting spending of 2014

M&A Outlook Report cites bullish sentiment from bankers and acquirers among the factors that could propel M&A to meet or exceed records. Security, mobility and cloud computing are among the sectors likely to see intense interest from growth-hungry strategic and financial acquirers.

Read More

Workspaces for tomorrow

The rising cost of energy, real estate, and office space, coupled with growing pressure to implement sustainable and environment friendly workspaces in order to attract and retain the next generation of workers, is driving organisations to rethink the roles of their employees within the organisation, how they collaborate, and their relationships to applications and devices. This trend is ushering in a massive transition in the workplace that’s aimed at raising the productivity of...

Read More




Radware has released its 2019-2020 Global Application & Network Security Report. The report found...
New data reveals organisations do not have sufficient visibility into the devices used by employees.
Netskope Cloud and Threat Report reveals cybercriminals target trusted cloud apps for phishing and...
Zscaler has published a new study that examines hidden vulnerabilities found in enterprise virtual...
BeyondTrust experts forecast future threat vectors most likely to affect organizations worldwide in...
Addressing cloud security challenges through Fujitsu Managed Security Services.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more