Mobile security in the spotlight

63% of businesses do not attempt to manage corporate information on employee-owned devices; mobile security incidents cost more than $100,000 for almost half of firms surveyed.

Read More


Most data breaches caused by human and system errors

Symantec Corp. and the Ponemon Institute have released the 2013 Cost of Data Breach Study: Global Analysis which reveals human errors and system problems caused two-thirds of data breaches in 2012 and pushed the global average to $136 per record[1]. Issues included employee mishandling of confidential data, lack of system controls, and violations of industry and government regulations. Heavily regulated fields including healthcare, finance and pharmaceutical incurred breach costs 70 percent...

Read More

DDoS for the data centre

Juniper Networks has announced the availability of Junos® DDoS Secure to protect data centres against increasingly complex Distributed Denial of Service (DDoS) attacks. A key part of Juniper’s security portfolio, Junos DDoS Secure uses behavioral analytics and detailed network visibility to provide scalable protection against all major types of DDoS attacks.

Read More

Converged infrastructure choices from Dell

New solutions optimised for applications and workloads from branch office to scale-out data centre.

Read More


One of the largest printing companies in the Nordic region has opted for hyperconvergence to...
Dell Technologies advances software-driven innovation across its storage portfolio, driving...
Luminance, the AI provider for legal process automation, has entered into a strategic partnership...
Software adds support for TCP/IP and Fibre Channel, flexible data protection, performance...
Global technology provider Arrow Electronics has signed a global agreement with Lenovo to deliver...
Unitrends and Unitrends MSP have introduced Unitrends version 10.3 software for Recovery Series...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more