IT managers increasingly concerned about DDoS attacks

New independent research commissioned by Corero Network Security shows that businesses are more stressed than ever about being the target of a Distributed Denial of Service (DDoS) attack.

Read More

By 2015, 10 percent of overall IT security will be delivered in the Cloud

By 2015, 10 per cent of overall IT security enterprise product capabilities will be delivered in the cloud, according to Gartner, Inc. The services are also driving changes in the market landscape, particularly around a number of key security technology areas, such as secure email and secure Web gateways, remote vulnerability assessment, and Identity and Access Management (IAM). Gartner expects the cloud-based security services market to reach $4.2 billion by 2016.

Read More

LANDesk Service Desk 7.5 streamlines service desk operations for over 2,000 users

University of Cambridge chooses LANDesk to automate service desk support and deliver better customer service.

Read More

EVault launches Cloud Disaster Recovery Service in EMEA

EVault, Inc. has announced its market-leading EVault ® Cloud Disaster Recovery Service (EVault CDR) with a guaranteed Service Level Agreement (SLA) is now available from EVault and its partners in Europe, the Middle East, and Africa (EMEA).

Read More

Cohesity has announced at Catalyst, the company’s three-day virtual summit, expansion and rapid...
Worldwide IT spending is projected to total $3.7 trillion in 2018, an increase of 6.2 per cent...
BY William Rabie, CenturyLink EMEA Cloud Business Director.
CRUK Cambridge Institute faced a pressing challenge: the need to extend its storage infrastructure,...
Supermicro Computer has announced full support for the new NVIDIA A100™ PCIe GPUs across the...
Avnet, Schneider Electric and Iceotope have been joined by Lenovo to deploy its Lenovo ThinkSystem...
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more