Kemp introduces load balancers with native WAF

Web application firewall (WAF) services will now be natively integrated in the KEMP Technologies LoadMaster Operating System (LMOS) for load balancers. This will enable secure deployment of web applications, preventing Layer-7 attacks while maintaining core load balancing services and ensuring...

Read More
Swisslos enhances business resiliency

Swisslos, Switzerland’s National Lottery, has successfully implemented Actifio for enhanced data protection and storage efficiency.

Read More
Daisy Group awarded Royal Institution of Chartered Surveyors (RICS) contract

Business communications firm Daisy Group has been named as the new supplier for RICS (Royal Institution of Chartered Surveyors), following a recent competitive tender.

Read More
Colt Technology Services and Virtustream partner

Leading European service provider and US Enterprise Cloud Software provider enable mission-critical applications to move to the cloud with security/compliance and performance SLAs.

Read More
IT budgets and hiring stabilise in 2014

Complexity expected to grow in 2015 as IT budgets rise while IT departments feel a hiring squeeze.

Read More
MTI bolsters security offering with EnCase

Guidance Software brings digital investigation capabilities to the MTI Security Practice.

Read More
US$1 trillion to be spent on telecom and datacom over next five years

Market research firm Infonetics Research released data from its 2014 Telecom and Datacom Network...

Read More
Smartphone charging to consume almost 14,000 gigawatt-hours of dirty energy by 2019

A new report from Juniper Research has found that charging mobile devices will generate more than...

Read More
bluesource launches complete cloud archiving service

bluesource has launched EV247- said to be a unique, complete cloud archiving service, that combines...

Read More
Belden opens China plant

Belden Inc has begun producing industrial connectors in China.

Read More
ISACA outlines five principles for effective information and technology governance

In new guidance issued today, global IT association ISACA outlines five principles organizations...

Read More
South Lanarkshire Council appoints Bull to manage IT infrastructure

Following a competitive tender process, Bull Information Systems has won a five-year contract with...

Read More

Videos

Adam Pitton, Heimdal Security cybersecurity advisor and former UK cyber detective, discusses the findings of the company’s recent survey 80 North American MSPs, showing that fragmented security stacks drive...
Mike DePalma, VP, SMB Business Development, OpenText Cybersecurity, discusses the continuing evolution of cybersecurity alongside rapidly emerging AI solutions - with agentic AI gaining significant momentum -...
Mike Arrowsmith, CTO at NinjaOne, shares valuable insights into a number of cybersecurity issues, explaining how AI adoption itself isn’t problematic when done thoughtfully – but lack of cyber awareness in...
Andrew Batson, Head of U.S. Data Center Research at JLL, explains how the North America data centre colocation market has reached a critical tipping point, with vacancy rates plummeting to an unprecedented...

Expert Opinions

By Dave King, Product Engineering Architect at Cadence.
By Tim Popovich, COO, Climb Channel Solutions.
By Dave King, Product Engineering Architect at Cadence.
BY Jerry Fujii and Naoki Ueyama, Partners in the Tokyo office of Morgan Lewis.