TechData teams with iPass

Tech Data has form a pan-European agreement with iPass Inc. (Nasdaq: IPAS), a leading provider of global mobile connectivity, to distribute its intelligent connection management and Wi-Fi service offerings.

Read More

Tackling the compromised IoT threat

Exabeam has introduced a new product that uses machine learning to spot compromised IoT and other devices. Exabeam Entity Analytics discovers the normal behaviour of medical, industrial, networking, home and mobile devices, and uses that baseline to alert security teams when unusual events occur.

Read More

NEWS

DigiCert selected to provide Root CA for AeroMACS

DigiCert has been selected to host the Root CA for Aeronautical Mobile Airport Communication System (AeroMACS), the only wireless technology that has been validated by major international regulatory bodies to support the safety and regularity of flight.

Read More


Unreliable VPNs highlight the dangers of remote working

Over half of remote workers spend up to one day a week connected to unsecured networks.

Read More

NEWS

Organisations slow to change after cyber attacks

CyberArk survey findings show organisations are failing to secure privileged accounts and credentials in the cloud, on endpoints and across IT environments.

Read More

Immer mehr Menschen arbeiten mobil – laut IDC erledigen im Jahr 2015 bereits 37 Prozent der...
Commenting on a New York Times story about the governance issues that portable devices and their...
Fujitsu integriert die branchenführende Deduplizierungstechnologie von Quantum in die neue...
Focus on Education campaign will drive business for resellers during peak buying season – new...
Symantec Corp.'s Internet Security Threat Report, Volume 18 (ISTR) has revealed a 42 percent...
The results of the 10th Annual Market Pulse Survey fromSailPoint Technologies Holdings expose an...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more