Shadow IT lurks uncomfortably, for IT departments

The growth in ‘Shadow IT’ is leaving IT departments caught between a rock and a hard place, according to Simon Bain, CTO of search specialists, Simplexo, who suggests that the concerns existing around managing unsupported devices are equally matched by the need to bring IT expenditure in on budget.

Read More



ExaGrid and ATScloud partner

New hybrid cloud offering, Secure BDRcloud, enables customers to replicate backup data for DR to an offsite cloud, reducing or eliminating use of tape.

Read More

New survey highlights worrying lack of guidance from employers on use of personal devices

A survey commissioned by the Information Commissioner’s Office (ICO) has shown many employers appear to have a ‘laissez faire’ attitude to allowing staff to use their personal laptop, tablet computer or smartphone for work business, which may be placing people’s personal information at risk.

Read More

Fusion launches BMC Remedy ITSM 8.0

Service management provider, Fusion Business Solutions, collaborates with BMC to deploy upgraded IT service management (ITSM) package. IT operations specialist, Fusion Business Solutions, announces the availability of BMC Remedy’s upgraded ITSM 8.0 solution, as an extension of its existing offering. The new solution is simpler to use, improves IT collaboration and integrates with social media tools.

Read More

Datto has published findings from its fourth annual Global State of the Channel Ransomware Report....
DataDirect Networks has given details of a new collaboration with Council of Scientific Industrial...
By Rob Bath, VP Engineering, EMEA, Digital Realty.
Super Micro Computer has introduced new SAP HANA® servers certified by SAP for VMware HCI. With...
Acronis is entering into a training partnership with German qSkills. The Nuremberg-based company...
Buried info costs businesses ?20m in missed opportunities.
Latest Video

Technical Discussion: Encryption and Security at High Speed over Distance for IP Storage

Why do so many IP replication solutions lack encryption capabilities, and why is performance an issue when you need to encrypt data inflight? Check out Brocade subject matter experts discussing the challenges of maintaining security while replicating data between data centers at high throughput, including how Brocade addresses this architecturally with IP Extension.

Read more