Five reasons for including secure workspaces in BYOD deployments

Dell advocates the use of secure enterprise workspaces in BYOD environments to help organisations balance employee expectations, business goals, IT requirements and security needs. Today, a plethora of options exist for providing employees with the software and other enterprise resources needed to do their jobs. A secure workspace, however, is the most effective approach for accommodating employees’ needs for anywhere, anytime access to corporate data and resources while also elevating...

Read More

Use the new EU Data Protection reforms to secure funding for IT security, says Databarracks

The EU is to impose new data protection legislation to ensure better protection of the personal information of all EU citizens. The reforms will come with more severe fines for organisations that suffer data breaches. Peter Groucutt, managing director at Databarracks, claims that this is the tool IT professionals can use to drive-through security changes, as failure to do so will now result in severe repercussions: “Often, the fines imposed on organisations that suffer data breaches are...

Read More

Elitetele.com launches managed firewall services to help firms secure increasingly complex IT landscape

Elitetele.com has introduced a suite of unified threat management (UTM) solutions, including next generation firewalls, for IT teams struggling to secure a rapidly-evolving IT landscape.

Read More

Blue Coat reveals security risks from “One-Day Wonders” websites

Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the majority of these “One-Day Wonders” are the backbone for how Internet content is shared and delivered, the sheer volume provides cover for malicious activity, including communication to infected systems.

Read More

Kroll Ontrack improves Apple mobile device data recovery success by 60 per cent

Technology breakthrough is a game changer for consumers with a data loss from the latest Apple mobile devices.

Read More

Autotask introduces Smart IT guide

Evolving from an hourly-fee based break/fix (B/F) service model to one that includes a managed services (MS) recurring-revenue model provides benefits to both IT Service Providers (ITSPs) and their clients. Len DiCostanzo, SVP, Community and Business Development, outlines five basic steps to creating a customisable pricing framework designed to optimise profitability in Autotask Corporation’s new Smart IT Guide™: 5 Steps to Pricing Managed Services.

Read More

CloudCamp Blog, By Steve Broadhead, Broadband-Testing.
Combining secure information governance and collaboration to transform the firm’s operations for...
Binalyze enables enterprises to respond to cyber breaches in real-time which dramatically speeds up...
Partnership to deliver advanced cyber security and threat prevention solutions to maximize customer...
Cloud Security Assessments help organizations understand cloud-specific threats and security...
Trend Micro Cloud One automates and simplifies cloud security to give organizations the flexibility...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more