Tier-3 builds on strengths in analytics, compliance, automation and incident response

New real-time Governance, Risk and Compliance dashboards deliver live, continuous compliance and security status view for business stakeholders.

Read More


76 per cent of UK IT pros rank their security above average

SolarWinds has released the results of its Information Security Confidence Survey, which explored IT professionals' confidence in their organisations' security measures and processes. The survey found that while confidence is notably high, likely the result of several key factors, widespread adherence to security best practices is lacking and significant, damaging attacks continue, potentially indicating this confidence is a false sense of security.

Read More

Verizon identifies key enterprise technology trends for 2015

Strategic network investments will be a major focus point for savvy CIOs in 2015, as companies seek to make sense of big data, transition to the cloud and monetize the Internet of Things (IoT), according to Verizon Enterprise Solutions’ list of top enterprise technology trends for 2015. In the coming year, enterprise organizations will also adopt technologies that drive business innovation and provide a strong platform for future growth.

Read More



eData team to host webinar on the current state of EU data privacy law and the firm’s new EU...
Trustwave and Palo Alto Networks have formed a strategic alliance designed to bring next-generation...
The UK’s biggest housebuilder is now using SureCloud to simplify and manage its GDPR compliance...
In the ever changing and increasingly complex landscape of cyber security, Sophos Labs experts...
LogRhythm’s platform to optimise and simplify security workflows at UK education provider.
Ipswitch set out to uncover the biggest issues facing IT departments as 2016 approaches. The...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more