LogRhythms neue Identity Interference Engine verknüpft Benutzer-IDs mit Security-Ereignissen

LogRhythm 6.2 hilft dabei, auf Cyber-bedrohungen noch schneller und effizienter zu reagieren. Die neue und leistungsstärkere Version der führenden Security-Intelligence-Plattform bietet zudem eine für Mobilgeräte und Web-Browser optimierte Benutzeroberfläche, die alle...

Read More
Total and Databarracks to provide cloud services in new partnership

With over 25 years of experience between them, service providers Total Ltd and Databarracks are joining forces to provide the latest cloud backup and disaster recovery services. Stuart Baikie, managing director from Total commented on the similarities between the two organisations’ ethos:...

Read More
ISACA guidance on managing vendors using COBIT 5

Guide provides sample SLAs, case studies and mappings.

Read More
Veracode partners with Imperva

Technology integration simplifies compliance and enables faster vulnerability mitigation,...

Read More
Three-quarters of consumers say organizations don’t care about protecting their data

Most consumers just don’t believe that the personal and financial data they submit to...

Read More
Unzufriedene Kunden durch ineffizientes Papiermanagement

Einer Iron Mountain-Studie zufolge verlieren Unternehmen ihre Kunden, weil sie ihr Papier nicht in...

Read More
F5 erweitert Synthesis-Architektur mit höherer Absicherung für das Web und erweitertem Schutz vor Betrug

Die neuen Lösungen bieten Unternehmen einen breitgefächerten Schutz für Netzwerke,...

Read More
Check Point collaborates with VMware

Check Point automates network security for VMware virtualization and cloud environments.

Read More
Steria survey reveals that overconfidence threatens the security of UK's enterprises

Steria has revealed that 96% of UK’s enterprises believe they are capable of dealing with a...

Read More
Sophos delivers Advanced Threat Protection for the small and mid-market

Sophos has announced an extensive update to its award winning Unified Threat Management solution,...

Read More
Company culture is holding back the Connected Business, not technology

Enghouse Interactive survey reveals culture and structure is inhibiting the growth of connected...

Read More
Software takes centre stage

New user-vendor forum set to define and promote OpenFlow-based, merchant-optical networking...

Read More
Cybercrime strikes more fear than NSA spying

Despite the NSA and Snowden controversy dominating news headlines and sparking a serious privacy...

Read More

Videos

Tony Kelly, Director of Alliances, EMEA at Fivetran, explains what Fivetran’s enhanced partner programme means – higher incentives via the four partner tiers, deeper go to market collaboration and expanded...
John Paglicua, President and CEO at N-able, discusses the findings of the recently published second annual MSP Horizons Report in partnership with leading channel analyst firm, Canalys. The report reveals a...
Steve Petryschuk, Director, Product & Market Strategy in Product Management, Auvik, discusses the findings of the company’s recent 2025 IT Report, entitled: “Why IT is long on challenges but short on...
Mike Hoy, CTO, Pulsant, outlines some of the end user uncertainties related to cloud - discussing network connectivity, data sovereignty and data migration concerns. With AI set to ask further cloud questions,...

Expert Opinions

By Matthew Ekholm, Digital Product Passport and Circularity Specialist at Protokol.
By Steve Prescott-Jones, director of managed services at UBDS Digital.
By Duncan Roberts, Associate Director at Cognizant Research.