Sitzt IT mit am Tisch oder nur im Keller?

In den Unternehmen vollzieht sich ein Umbruch: IT nimmt eine neue Rolle ein. Anstatt Dienstleister zu sein, wird sie künftig Verantwortung für die Wertschöpfung übernehmen

Read More
Coming standards for mobiles combine ID security and ease of use

NAPPS and SCIM are two new standards due to appear over the next eighteen months which will both strengthen and enrich the services that spring off the back of using Single Sign-On ID management on mobile devices

Read More
Unified Threat Management was main driver of the EMEA Security Appliance market
  • Published in

According to the International Data Corporation (IDC) Europe, Middle East and Africa Quarterly Security Appliance Tracker, 4Q14 vendor revenue for the EMEA security appliance market reached $688.5 million, a 0.4% decrease over the same quarter a year ago. Shipments declined by 8.7% year on year...

Read More
Server revenues fall further in EMEA

According to the latest EMEA Server Tracker from International Data Corporation (IDC), factory...

Read More
Consortium launches three-year project to boost energy efficiency of urban data centres

The European Commission has awarded a €2.9m grant to a consortium of manufacturers, users, and...

Read More
Tech Mahindra to manage end-to-end IT infrastructure for Volvo Car Group

Global data centre, 4,000 factory devices, 2,800 servers to be managed and supported.

Read More
Weserve B.V. selects Flexiant to replace existing Cloud platform

Flexiant able to support Weserve’s multi-datacenter requirements.

Read More
Tegile Systems ships 1,000th Zebi Array

Tegile Systems has shipped its 1,000th Zebi™ storage array since making the solution...

Read More
Simplifying the growing complexity of email management

SolarWinds has announced its continued commitment to providing greater application visibility to...

Read More
GroundWork partners with Quru

GroundWork, a leading Unified Monitoring solution for IT operations management, virtualisation and...

Read More
Arbor applies analytics to security

Available as a cloud-delivered service or for on-premise use, Arbor’s Pravail Security...

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

Expert Opinions

By David Sewell, Chief Technology Officer, Synechron.
By Mark Daley, Director of Digital Strategy and Business Development, Epsilon Telecommunications.
By David Trossell, CEO and CTO of Bridgeworks
This year is set to be a pivotal year for cloud strategy, with repatriation gaining momentum due to shifting legislative, geopolitical, and technological pressures. This trend has accelerated, with a growing...