Understanding data compliance

By Campbell Williams, group strategy and marketing director, Six Degrees Group.

Read More
Five ways to help your IT department become more efficient

By Robert Doswell, managing director of Tools4ever UK, a global provider of identity and access management solutions.

Read More
Cryptography advisory board receives a boost

Board will provide expert oversight of encryption schemes for advanced cloud security, and deliver a boost to enterprise adoption of cloud services.

Read More
Helping Infiniti Red Bull Racing stay ahead of the competition

HP high performance computing solution improves car aerodynamics for better race performance.

Read More
Red Hat breaks traditional storage barriers

Red Hat Storage Server 3 advances file storage and Apache Hadoop big data services for business...

Read More
vArmour Debuts in EMEA

‘Data Defined Perimeter’ solution protects critical assets wherever they reside by...

Read More
The reality of rising DDoS attacks

Almost a quarter of European companies (23 per cent) consider DDoS (Distributed-Denial-of-Service)...

Read More
LANDESK acquires Naurtech

LANDESK has acquired Naurtech, a company that develops connectivity solutions to provide mobile...

Read More
State-sponsored attacks: The worst has yet to come

Survey reveals that hacking landscape will get much worse and IT security professionals cannot even...

Read More
Acronis names John Zanni Senior Vice President of Cloud and Hosting Sales

Acronis has named John Zanni senior vice president of cloud and hosting sales. In this role, Zanni...

Read More
QLogic powers next generation servers

QLogic Corp. has announced a comprehensive suite of connectivity solutions for next-generation...

Read More

Videos

James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
DCW Asia 2025 - Part 1 of 3

Expert Opinions

By CEO of Global Commissioning, Louis Charlton
By Manvinder Singh, VP of Product Management for AI at Redis.
By Chris Ackerson, SVP of Product at AlphaSense.