Pinpointing malware movement

Sourcefire, Inc. has introduced innovative malware trajectory capabilities across its Advanced Malware Protection portfolio, giving customers detailed visibility into malware attack activity and enabling them to detect, remediate and control malware outbreaks. With these additions, Sourcefire Advanced Malware Protection solutions are the only offerings that add a continuous capability to its malware blocking, going beyond point-in-time detection to confirm an infection, trace its path, analyse its behaviour, remediate its targets and report on its impact regardless of when a file is determined to be malware.

Read More
Lancope enhances forensics and incident response

New features bolster network protection against advanced attacks and insider threats.

Read More
Spiceworks brings mobile device management capabilities to IT professionals

Partnership with Fiberlink and introduction of Spiceworks 7 change the way 2.5 million IT professionals manage mobile devices.

Read More
Barracuda Web Application Firewall enhances protection against DDoS attacks

Barracuda Networks Inc has announced the latest Barracuda Web Application Firewall, version 7.8, specifically aimed at reducing the impact of automated attack attempts from botnets.

Read More
Customer preference is for hybrid IT Service Management

FrontRange, in partnership with THINKstrategies has announced the results of a comprehensive survey that examines how the accelerating adoption of cloud computing is impacting the ITSM needs of organisations.

Read More
Small and mid-sized businesses show strong support for BYOD initiatives

Eighty-four percent of respondents see security threat due to employee loss, theft or misuse of mobile devices

Read More
Ingram Micro Europe accelerates market growth opportunities with launch of Advanced Solutions Division

Ingram Micro Europe continues to redefine the VAD model to fuel success of channel partners in the midmarket and small business environments.

Read More
Mobile Applikationen: das Sorgenkind der Unternehmens-IT

Fünf Monate dauert es im Schnitt, bis ein Unternehmen seine mobilen Applikationen auf neue Software-Versionen mobiler Endgeräte angepasst hat. So lautet das niederschmetternde Ergebnis einer von Vanson Bourne durchgeführten Untersuchung.

Read More
NovaBACKUP DataCenter für DCS Awards 2013 nominiert - NovaBACKUP DataCenter 5.0 gelangt in der Kategorie Datacentre Storage Software Produkt ins Finale der Datacentre Solution Awards 2013

Die Jury der DataCentre Solution Awards 2013hat NovaBACKUP DataCenter von Datensicherungsspezialist NovaStor in das Finale des diesjährigen Wettbewerbs gewählt. Zusammen mit Produkten von Veeam, FalconStor und EVault wurde NovaStors NovaBACKUP DataCenter als „Datacentre Storage Software Product of the Year“ nominiert

Read More
Neuer Firefox 23 blockiert gemischte Inhalte: SSL-gesicherte Websites schon jetzt auf „Aurora“ vorbereiten

Die neue Version des beliebten Browsers Firefox wirft ihre Schatten voraus. Die 23. Auflage mit dem Code-Namen „Aurora“ soll am 17. Mai offiziell erscheinen

Read More
Zwei-Faktor-Authentifizierung für den „Informationsmotor Analytics“: Über Smartphone und Co. Nutzer eindeutig identifizieren - Big Data-Infrastrukturen tokenlos absichern Autorin: Julia Manderbach, freie Journalisti

  1.000.000.000.000.000.000.000 Zettabyte – diese Datenmenge überschritt das globale digitale Universum erstmals im Jahre 2010, laut der IDC-Studie "Extracting value from Chaos". Die Sammlung, Verarbeitung und Analyse dieser enormen Datenmengen wird in der IT-Welt unter dem Phänomen „Big Data“ zusammengefasst. Um diese Informationsmasse handhaben zu können, bedarf es riesiger Infrastrukturen. Bedenkt man den Wert der Daten, die dort kursieren, darf die Sicherheit keinesfalls zu kurz kommen: Nur autorisiertes Personal sollte über Zugriffsrechte verfügen. Dies können Unternehmen einfach und flexibel mittels tokenloser Zwei-Faktor-Authentifizierung gewährleisten.

Read More
Four out of five businesses (80%) have little or no visibility of data movement

But 64% of British business professionals admit managed file transfers are "vital" to data security, with the majority taking collective responsibility and just 3% blaming IT.

Read More
Brits value their digital assets at nearly £15,000

A new global report from McAfee reveals the price that Brits place on their digital assets, demonstrating the value that society now places in these intangible items.

Read More

Videos

Sergio Afonso, Sales Director at NKA Tech, discusses the innovative @RACK Mobile Data Destruction System - which recently won the DCS Awards’ Data Centre ICT Security Innovation Award - explaining the many advantages it offers over the existing alternatives. He also shares some exciting future plans in terms of expanding both the @RACK portfolio and market coverage.
Gisli Kr., Chief Sales Officer at AtNorth. discusses the carbon footprint AI explosion, suggesting that finding the right sustainable data centre to host these AI applications can help contribute to the circular economy. He also provides updates on the company’s third Icelandic data centre, some new hires, and record revenue levels – which in part can be contributed to atNorth’s strong sustainability credentials.
Eric Eppe, Head of Portfolio & Strategy, HPC/AI/Quantum at Eviden, Atos Group and also the UEC Secretary, discusses the formation of the Ultra Ethernet Consortium to deliver on Ethernet-based open, interoperable, high-performance full-communications stack architecture to meet the growing network demands of AI & HPC at scale.
Jason Gerrard, Director of International Systems Engineering at Commvault, explains the advanced security features recently added to the company’s data protection solutions portfolio, featuring on-prem and SaaS management integration, risk analysis, threat scan and advisor, auto recovery and Microsoft and CyberArk integrations.

Expert Opinions

By Andy Swift, Cyber Security Assurance Technical Director at Six Degrees.
By Mark Molyneux, EMEA CTO at Cohesity.
By Jan Junker, EVP EMEA Sales at TeamViewer.
How MSPs achieve neutrality in a multi-provider world. By Lee Thatcher, head of cloud, Cloud CoCo.