Unisys unveils Stealth solution

New Unisys Stealth for Mobile solution protects against data breaches and other cybersecurity risks created by proliferation of consumer devices in the workplace.

Read More


Beta release of Red Hat Enterprise Linux 6 now available

To keep pace with the demand for enterprise-class infrastructure, the newest version of the leading Linux platform, the beta release of Red Hat Enterprise Linux 6.5, extends its scalability and manageability to aid in the build-out and control of large, complex IT environments. For example, Red Hat Enterprise Linux 6.5 will be designed to simplify the operation of mission-critical SAP applications by automating the optimal configuration of common SAP deployments.

Read More


Global study shows need for C-level leadership

Capgemini Consulting, in partnership with MIT Sloan Management Review, has announced the findings of a new global research survey into Digital Transformation – the opportunity for radical business change offered by the convergence of new digital technologies such as social media, mobile, analytics, and embedded devices. The study, “Embracing Digital Technology: A New Strategic Imperative,” reveals that while the potential opportunity of Digital Transformation is absolutely...

Read More

Becrypt continues innovation

Latest version of Advanced Port Control provides the only CAPS approved Port Control solution for high grade security levels.

Read More

Cybercriminal tactics have evolved into using multiple attack methods and often multiple payloads...
At Gartner IAM, the leading Identity and Access Management conference, ForgeRock®, the leading...
New Group wide initiative will enable organisations to embrace digital transformation securely.
69% of IT professionals are not confident their data would be secure if perimeter defenses were...
Secureworks has published the findings of a research report which analysed more than a thousand...
The Internet is the new enterprise corporate network as revealed in Zscaler’s State of digital...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more