Acronis: Integration von mobilEcho in MobileIron AppConnect

Kombination aus sicherem Mobile File Management und App- und Device-Management ermöglicht effizientere Verwaltung und höhere Datensicherheit

Read More

Professionelle NAS-Produktlinie sichert File-, Block- und Cloud-Daten: Tandberg Data stellt Netzwerk-Speicher BizNAS™ vor

Tandberg Data, einer der führenden Anbieter professioneller Datensicherungslösungen für kleine und mittlere Unternehmen, Remote Offices und Arbeitsgruppen, stellt mit BizNAS™ eine Network-Attached-Storage-(NAS-)Produktfamilie aus Eigenentwicklung und –fertigung vor

Read More


The Open Group releases Global Technology Supply Chain Security Standard

The Open Group announces the publication of the Open Trusted Technology Provider Standard (O-TTPS)™, the first complete standard published by The Open Group Trusted Technology Forum (OTTF)™ and which will benefit global providers and acquirers of Commercial Off-the-Shelf (COTS) Information and Communication Technology (ICT) products. This open standard is the first of its kind to help organizations achieve Trusted Technology Provider status, assuring the integrity of COTS ICT...

Read More

NetIQ bolsters actionable security intelligence with NetIQ Change Guardian 4.0

Deeper privileged user activity and change monitoring speeds threat identification to avoid data loss.

Read More


Dell achieves five million random read input/output per second (IOPS), accelerates application...
As a member of the Brazil Seguro Consortium, Unisys will provide IT infrastructure solutions for 12...
Mit HP AppSystems for SAP HANA erhöht der Druckluftspezialist geschäftliche Effizienz,...
Trend Micro Zero Trust Risk Insights reveals and prioritizes risks for better decision making.
Database-agnostic platform solves cloud data security complexities by delivering native support for...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more