Unifying physical and Cloud security

Unified security architecture is capable of being mapped, tested and measured; enables more proactive threat prevention and auditable regulatory compliance.

Read More
Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide...

Read More
Greater device visibility and management

Webroot has announced updates to Webroot SecureAnywhere® Business Mobile Protection. As more employees rely on their mobile devices for both personal and professional activities, the risk of mobile malware and unsafe applications presents challenges for organisations. A recent Harris survey...

Read More
Central government ambitions to slash ICT costs are hard to fulfil

New research from analyst firm Kable suggests that highly-publicised government targets to slash...

Read More
Hunt for attacks in real-time

See what attacks are hiding in your network traffic with our Cloud or on-premise assessments.

Read More
Risk:Value report reveals majority of UK senior executives expect to suffer a security breach

NTT Com Security research shows company insurance failing to cover for security beaches.

Read More
SecureAuth announces international expansion into Europe

Award-winning authentication provider appoints Bruce Jubb as Director for EMEA.

Read More
77 percent of executives ‘confident’ in basic security controls

Twenty-seven percent of IT professionals ‘not confident’ in the secure configuration of...

Read More
Painful compliance audits ahead

Frightening lack of awareness of the European Commission’s draft bill that unifies and...

Read More
Fujitsu and Shelter celebrate two year partnership

Innovative charity collaboration sees Fujitsu offer practical support to help the charity achieve...

Read More
Imperva introduces Cloud Reference Architecture

New Reference Architecture provides validated blueprints for implementing comprehensive web...

Read More
Sophos announces expanded security offerings through AWS Marketplace

Sophos has announced the expansion of their product portfolio on AWS Marketplace with the addition...

Read More
CA Technologies CEO challenges business and technology leaders to build new capabilities

CEO Mike Gregoire kicked off CA World ’14 with a keynote address to thousands of customers...

Read More
Zycko and ObserveIT announce distribution partnership

Zycko has announced a new relationship with ObserveIT. A pioneer in user activity monitoring,...

Read More

Videos

Adam Raymond, Sales Manager UK & Ireland at SWEP International, discusses the increasing pressures on data centre cooling thanks to the AI explosion, explaining how liquid cooling solutions - rear door heat...
Dan Dulac, Extreme Networks’ VP of Solutions Strategy, discusses the recently launched Extreme Platform ONE™ for Managed Service Providers (MSPs). Built on a unique AI-driven multi-tenant architecture,...
Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...
Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...

Expert Opinions

AI is revolutionising work in the unified communications sector, but with its transformative potential also come challenges; William Rubio, CallTower’s CRO explores the key areas where AI is making an...
By Victoria Boryaeva - Senior Director of Marketing and Business Development at Pulseway
By Zeki Turedi, Field CTO, EMEA, CrowdStrike.