Der Informationsrisiko-Index:

Warum die Bewertung von Informationsrisiken für mittelständische und große Unternehmen entscheidend sein kann

Read More
Höchste Sicherheit für Patientendaten: HS256S stellt "digitale Schweigepflicht" in Arztpraxen sicher

Wer zum Arzt geht, der muss vertrauen: In erster Linie in die Kompetenz und Professionalität des Mediziners. Aber auch darauf, dass dieser Daten zur Person und Diagnose nicht nur vertrauensvoll behandelt, sondern auch zuverlässig schützt

Read More
Brandentwicklung, Stromausfälle, Einbrüche: Unternehmen sollten Betrieb von Rechenzentren externen Spezialisten überlassen

Brandentwicklung, Stromausfälle, Einbrüche: Ob für die Website, das Intranet oder den Einsatz von Anwendungen im Netzwerk - an dem Betrieb eines oder mehrerer Server kommt heutzutage kein Unternehmen mehr vorbei

Read More
Managed Services & Hosting Summit 2013 – initial sponsors and keynote announced

Sponsors include: AVG, Autotask, Dot Hill, EVault, Gigamon, Interxion and Tarmin; Tiffani Bova, VP...

Read More
Enterprises sitting on security ‘time bomb’

Companies are at serious risk of data security breaches as 43 per cent of UK office workers admit...

Read More
Wearable tech will drive the rise of the ‘human cloud’ of personal data

Rackspace Hosting has announced findings of an in-depth study into the use of wearable technology...

Read More
Bull signs service contract with the Tele Columbus Group

The five year contract will ensure the stability of IT operations at the Berlin-based cable network...

Read More
DP World selects Dimension Data

Solution includes, design, build and support of port network infrastructure including a secure Data...

Read More
The Green Grid takes giant StEP towards e-waste leadership

Collaboration with e-waste think tank aimed at educating organisations on electronic equipment...

Read More
ISACA issues COBIT 5 for Assurance

Establishing confidence in IT processes and controls is important, but audit and assurance...

Read More
Chip-to-application transformation

McAfee introduces two new suites: McAfee Complete Endpoint Protection – Enterprise, and...

Read More
Small to mid-sized business IT budgets surge 19 percent

Hardware purchases drive increase in spending; backup/recovery software and tablets show strong...

Read More
Simplifying mobile security

McAfee has announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software)...

Read More
CIOs need to optimise BYOD for new technologies

According to a new whitepaper revealed by independent datacentre consultancy, Glasshouse...

Read More

Videos

Daniel Thorpe, Associate Director of Data Centre Research at JLL, explains the reasons behind the edge data centre market’s predicted doubling by 2026 – with data regulation, low latency demand and IoT...
Dr. Avesta Hojjati, VP of Engineering at DigiCert, explains the thinking behind the creation of the first ever World Quantum Readiness Day – detailing the very real threat that quantum computing could...
Ben Rogers, Sales Manager, CloudBilling, explains the ways in which the company helps MSPs to overcome multiple billing challenges by providing automation, standardisation and reducing complexity. CloudBilling...
Erik Nicolai, CEO of Workspace 365, discusses the building blocks of a digital workplace, and more general digital transformation, strategy, highlighting the challenges to be overcome – such as complexity,...

Expert Opinions

BY Francis O'Haire, Group CTO, Climb.
By Dennis Frank, Vice President, EMEA Strategic Partners & Alliances and EMEA Inside Sales.
By Michelle Would, Director of Customer Experience at Agilitas IT Solutions.
By Alistair Barnes, Head of Mechanical Engineering at Colt DCS.