Co-lo stepping stones to the cloud

Co-location can serve as an opportunity for organisations to test the waters with various vendors and outsourcing strategies. Nigel Offley of CentriLogic outlines the benefits and risks associated with co-location, and identifies how co-locating IT infrastructure can serve as a strong first step...

Read More
Juniper Networks expands Spotlight Secure

Juniper Networks has announced new advancements in its security capabilities that extend the Juniper Networks® Spotlight Secure threat intelligence platform and link it with firewall policies in Juniper Networks SRX Series Services Gateways.

Read More
Centrify powers Samsung KNOX Enterprise Mobility Management solution

Centrify Corporation has expanded its strategic OEM partnership with Samsung Electronics Co., Ltd. to power the cloud-based identity and access management (IAM) features of the Samsung KNOX EMM (Enterprise Mobility Management) cloud-based service.

Read More
Less than half of European enterprises are ready for Cloud

A survey by International Data Corporation (IDC) has discovered that European IT departments still...

Read More
Trustworthy Software Initiative to be based at WMG's Cyber Security Centre

WMG's Cyber Security Centre at the University of Warwick is to host a million pound programme...

Read More
Capgemini and VMware announce strategic partnership

Capgemini and VMware have announced a strategic partnership in the area of Enterprise Managed...

Read More
Intel unveils new developer tools for future technologies

Intel Corporation CEO Brian Krzanich kicked off Intel's annual technical conference with a...

Read More
OpenStack revenue expected to hit $3.3 billion by 2018

The market for OpenStack-related products and services will quadruple in size between the end of...

Read More
Global survey finds 85% of mobile apps fail to provide basic privacy information

A survey of over 1,200 mobile apps by 26 privacy regulators from across the world has shown that a...

Read More
Cyber attack complexity leaves many organisations exposed

As new cyber attacks continue to emerge, 48 percent of IT security professionals admit they are not...

Read More
Big business decisions driven by gut instinct as well as gigabytes

Business leaders are taking major strategic decisions about the future of their businesses based on...

Read More
Turning the tables on cyber attackers

New RSA® Advanced Security Operation Center Solution arms security teams with new tools to help...

Read More
Mirantis partners with Arrow in UK and Ireland

OpenStack cloud technology company broadens access, distributing commercial-grade open-source cloud...

Read More
Netskope joins the Cloud Industry Forum

Netskope, a leader in cloud app analytics and policy enforcement, has become the newest member of...

Read More

Videos

Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.
DCW Asia 2025 - Part 2 of 3

Expert Opinions

By Eric Herzog, Chief Marketing Officer at Infinidat
By Mark Daley, Director of Digital Strategy and Business Development, Epsilon Telecommunications.
By TES Group, specialists in manufacturing reliable, high-quality, high-performance power distribution and monitoring systems.