Mit dem 25. August 2013 ist eine neue Verordnung der Europäischen Union in Kraft getreten, die langfristig Auswirkungen auf die E-Mail Kommunikation aller Unternehmen in der EU haben könnte. Mit der Regelung wird – zunächst für Telekommunikations- und Internet-Anbieter – eine 24-stündige Meldepflicht von Datenpannen und Datendiebstählen eingeführt
Read MoreSoftcat has achieved HP’s highest possible accreditation through an on-going concerted resource and training investment. The Platinum accreditation follows a year that has seen Softcat’s revenues leap to £400 million, with HP recognising Softcat for its sales delivery, awarding the reseller with its Enterprise Group Excellence Award for EMEA, and Gold Partner of the Year award for the second year running.
Read MoreComputer 2000 is changing its name to Tech Data. The rebrand means that the UK business is now operating under the same name as all the group’s European and global operations.
Read MoreTo keep pace with the demand for enterprise-class infrastructure, the newest version of the leading Linux platform, the beta release of Red Hat Enterprise Linux 6.5, extends its scalability and manageability to aid in the build-out and control of large, complex IT environments. For example, Red Hat Enterprise Linux 6.5 will be designed to simplify the operation of mission-critical SAP applications by automating the optimal configuration of common SAP deployments.
Read MoreBarracuda provides complete application security and secure remote access to Windows Azure.
Read MoreNetworkIT and Simply StoreIT programs simplify technology selection for SMB customers.
Read MoreCyberkriminalität kostet deutsche Unternehmen im Schnitt 5,7 Millionen Euro pro Jahr - ein Anstieg von 830.000 Euro oder 16 Prozent gegenüber 2012. Das geht aus der aktuellen Ausgabe der jährlichen Studie "Cost of Cyber Crime" hervor, die das Ponemon Institute im Auftrag von HP durchgeführt hat.
Read MoreCapgemini Consulting, in partnership with MIT Sloan Management Review, has announced the findings of a new global research survey into Digital Transformation – the opportunity for radical business change offered by the convergence of new digital technologies such as social media, mobile, analytics, and embedded devices. The study, “Embracing Digital Technology: A New Strategic Imperative,” reveals that while the potential opportunity of Digital Transformation is absolutely clear, the journey to get there is not.
Read MoreCorero Network Security has entered into an agreement under the Strategic Alliance Program with Neustar, Inc, an information services company and leading provider of cloud-based DDoS protection services. As a Neustar Strategic Alliance Program partner, Corero enables its customers to extend the power of its on-premise always on protection with the added security and flexibility of Neustar's on-demand, cloud-based DDoS protection services to combat growing cyber threats.
Read MoreHow should organisations approach data centre migrations to private clouds, while maintaining security and connectivity for critical business applications? By AlgoSec’s Paul Clark.
Read MoreLatest version of Advanced Port Control provides the only CAPS approved Port Control solution for high grade security levels.
Read MoreOneLogin, the innovator in enterprise identity management, has secured a $13 million round of Series B venture capital from lead investor The Social+Capital Partnership alongside returning investor Charles River Ventures. OneLogin will use the funds to continue its expansion in the United States, Europe and Asia-Pacific and to accelerate talent acquisition in these markets.
Read MoreMcAfee has announced what it says is the industry’s first “endpoint aware” security information event management (SIEM) solution that adds real time system state information to enhance situational awareness and streamline incident response. This innovative solution brings together big security data management capabilities of McAfee Enterprise Security Manager (ESM) with deep endpoint insight of McAfee Real Time. SIEM event data is combined with the proactive ability to immediately query, collect and analyse extensive endpoint context, including running processes, files, as well as system and security configuration.
Read MoreDie Hersteller von Mobilgeräten und passender Anwendungen liefern sich seit Jahren eine regelrechte Produkt- und Innovationsschlacht. Das erklärte Ziel: Alles für den Kunden. Das klingt gut. Erleichtern Smartphones und Apps den beruflichen und privaten Alltag, steckt darin eine Chance für modernes und vernetztes Arbeiten. Passend in diesem Kontext: „Telefonieren? Ist bei Smartphones eine nette Zusatzfunktion. Dank Apps für alles und jedes sind dem Einsatz kaum Grenzen gesetzt“, so Spiegel Online. Wie weit und rasant der Fortschritt geht, darüber berichtete die Wirtschaftswoche in ihrem Beitrag „Cockpit für den Alltag“. Darin ist die Rede von zuhörenden und mitdenkenden Smartphones. Ob Traum oder Albtraum muss jeder für sich entscheiden
Read MoreMcAfee has announced an end-to-end solution to help organisations combat the increasing challenges of advanced malware.
Read More