Variations in IT sourcing strategies

Apptio has released its first IT Economics Report profiling enterprise IT spending patterns. Every month, the world’s largest organisations use Apptio’s Cost Transparency application to calculate and analyse over $160 billion in annual combined IT spend. For the Apptio IT Economics Report, the company analysed the IT investments made by its customers last year and found three common resourcing strategies. These patterns, or archetypes, each represent...

Read More

20% of IT professionals have witnessed a security breach cover-up

Javvad Malik, Security Advocate at AlienVault, says results show a need for far greater support for employees and businesses when they fall victim to cyber attacks.

Read More



CyberArk helps Vodafone

Vodafone has implemented CyberArk to protect and manage its privileged accounts, identities and applications.

Read More


Cybercriminal tactics have evolved into using multiple attack methods and often multiple payloads...
Michael Fimin, CEO of Netwrix shares his list of top security trends for 2015.
92% of UK businesses have experienced a cyberattack in the last 12 months, with over two-thirds...
ManageEngine, the real-time IT management company, has announced enhancements across its identity...
Belden has announced an agreement to purchase cybersecurity leader Tripwire for $710M. Belden is a...
Manx Telecom deploys Radware’s DefensePro to help protect its networks on the Isle of Man.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more