NEWS

Blue Coat Systems acquires Elastica

With the addition of Elastica, Blue Coat defines the security stack for the cloud generation:  Integrates the Secure Web Gateway with Cloud Application Security Broker (CASB) to provide a secure path to the cloud for its more than 15,000 customers.

Read More

The future of security under scrutiny

Intel® Security has released its McAfee Labs Threats Predictions Report, which predicts key developments on the cyber threat landscape in 2016, and provides unique insights into the expected nature of that landscape through 2020, as well as the IT security industry’s likely response.

Read More

Digital divide creates business opportunities

Closing the deepening gap between digitally connected populations and those cut off from the Internet is a global challenge, but one that presents ICT companies and other innovators with significant business opportunities, according to a new report by Huawei.

Read More

entrustIT re-certifies against the CIF Code of Practice

CSP differentiates its services with Cloud best practice certification scheme.

Read More

Nine out of ten UK cloud strategies get derailed

Research uncovers delays and diversions that obstruct organisations’ journey to the cloud.

Read More

Boardroom demand for innovation now driving cloud adoption

CEOs, business leaders and Board of Directors drive six in ten (61%) cloud migrations.

Read More

Insight Intelligent Technology Index reveals two thirds of CIOs feel IT is being setup to fail,...
By Saskia Van Daal, Product Marketing Manager at Tableau Software.
Cloud outpacing need for colocation.
New Cloud Hosting services for Europe; Hosting Centre based in the UK.
Findings show there is an expectation gap between expected benefits of the public cloud and what...
Organizations use of cloud is moving to the next level of maturity, spurring adoption of a...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more