CA Technologies to acquire Xceedium

CA Technologies has signed a definitive agreement to acquire privately held Xceedium, Inc., a provider of privileged identity management solutions that protect on-premise, cloud and hybrid IT environments. Terms of the agreement were not disclosed. The transaction is expected to close within the...

Read More
Enhancing Cloud security

Leading SaaS security company deploys SecurityCenter Continuous View to attain the most comprehensive and accurate view of its international, multi-tenant cloud environment.

Read More
Blue Coat launches Endpoint Alliance Ecosystem

Blue Coat Systems has unveiled its Alliance Ecosystem of Endpoint Detection and Response (EDR) partners. Blue Coat developed this ecosystem to allow actionable intelligence gathered from endpoint security solutions to be shared with the entire Blue Coat security portfolio, enhancing...

Read More
Blue Coat acquires Perspecsys  

Expands portfolio in exploding cloud security market, providing relief for multinational...

Read More
Imation Lock & Key solution provides new levels of data security  

Lock & Key is a component of Imation’s recently announced Secure Data Movement...

Read More
Hacks proliferate, while financial institutions bank on data protection to limit exposure in the cloud

CipherCloud has released its Q2 2015 Global Cloud Data Security Report. This quarter's report...

Read More
Disjointed technologies as biggest challenge facing UK IT security pros

Lack of qualified staff named second biggest challenge with user access and vulnerability...

Read More
Bidvest Foodservice chooses Fujitsu to overhaul and manage its IT infrastructure

Contract extension sees Fujitsu partner with the food wholesaler to modernise and streamline its IT...

Read More
Gemalto enables service providers to offer trusted crypto in the cloud

Gemalto launches first HSM purpose-built for hardware-based key management in the cloud.

Read More
Exposing hidden threats in encrypted mission-critical enterprise applications

Delivers industry’s first visibility solution that includes stateful SSL decryption to...

Read More
‘Internet of Things’ connected devices to almost triple

New data from Juniper Research has revealed that the number of IoT (Internet of Things) connected...

Read More
Sophisticated cyberattacks are defining the innovation race between adversaries and defenders

Findings underscore the need for retrospective analysis to reduce Time to Detection.

Read More
Sophos research reveals state of IT security in local government organisations

Two thirds of local government organisations adopt a shared services approach to cut IT costs but...

Read More
Firewalls deliver secure, high-speed 802.11ac wireless network performance

Dell’s high-performance wireless network security solutions are easy to install and manage,...

Read More

Videos

Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...
Lee Caswell, SVP, Product and Solutions Marketing at Nutanix, discusses the findings of its seventh annual Enterprise Cloud Index (ECI) survey and research report, which measures global enterprise progress...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...
Frank Koelmel, CRO at Logpoint, discusses the new partner program which sees the company amplifying its strategic focus on Managed Security Service Providers (MSSPs), opening opportunities for MSSPs to...

Expert Opinions

By Yuval Moss, Vice President of solutions for Global Strategic Partners, CyberArk.
By Erik Costlow, Sr Director, Product Management, Azul.
By Tim de Groot, General Manager for Benelux, Nordic And North West & Central Africa at Kaspersky.
By Dirk Alshuth, Cloud Evangelist at emma – the cloud management platform.