Complete Cloud-based security solution

iSheriff Complete replaces point products for web, email and endpoint security.

Read More
Providing deeper vulnerability management

BeyondTrust has launched the latest version of the company’s enterprise vulnerability management solution, Retina CS version 5.8. Users of Retina CS 5.8 will have access to several new solution integrations and features, including the ability to import vulnerability data from Intel...

Read More
Cyber startup initiative

A new programme to support cyber security startups will help develop innovative technical solutions that will help keep the UK safe from cyber attacks, the UK Government has announced.

Read More
Tenable Network Security supports Microsoft Azure

Leading developer of next-generation cybersecurity software now provides enhanced security visibility across three major cloud environments with release of Nessus for Microsoft Azure.

Read More
Check Point introduces new appliance series

15000 and 23000 Series appliances introduce full threat prevention to help keep enterprises one...

Read More
NEWS
Rendering stolen data useless to hackers

Timely move given the increasing frequency of devastating attacks globally as the kit allows...

Read More
NEWS
Report highlights business confusion amid rising cyber threats

More executives state responsibility for data security should reside outside of IT.

Read More
Lack of confidence in securing mobile payment methods

54% of surveyed IT professionals said their companies had a data breach involving payment data,...

Read More
Security and innovation driving transformation of the CIO

Insight research highlights growing importance of IT in the workplace with 8 in 10 business...

Read More
Dell locks up IP and boosts production by 75 percent for Briggs Automotive Company

Dell SonicPoint Wireless Access Points improve wireless internet coverage, increasing...

Read More
Bromium and NTT Com Security form global security partnership

Bromium and NTT Com Security have formed a strategic global partnership to deliver Bromium’s...

Read More
Bomgar improves privileged access management security and efficiency

Bomgar Privileged Access Management allows security organizations to better control, monitor,...

Read More
Unisys delivers enterprise security innovation on the AWS Cloud

Award-winning Unisys Stealth technology delivers micro-segmentation on the Amazon Web Services...

Read More
Decline in defender confidence

Businesses make strides in advancing security posture in the face of persistent attacks that...

Read More
Swivel Secure launches Swivel Cloud

Removes CAPEX investment needed to deploy multi-factor authentication; protects application...

Read More

Videos

Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...
Ed Bissell, Sales & Marketing Director, Stellium Datacenters, discusses an Open Compute Project (OCP) Proof of Concept at its HPC hyperscale data centre near Newcastle. This follows the integration phase of an...
Chris Derham, Business Development Director – Networks, Alcatel-Lucent Enterprise, discusses the company’s innovative generative AI chatbot, ALIE, which is available on a global scale for use by channel...

Expert Opinions

AI is revolutionising work in the unified communications sector, but with its transformative potential also come challenges; William Rubio, CallTower’s CRO explores the key areas where AI is making an...
By Duncan Roberts, Associate Director at Cognizant Research.
By Zeki Turedi, Field CTO, EMEA, CrowdStrike.
By Yuval Moss, Vice President of solutions for Global Strategic Partners, CyberArk.