Blue Coat enhances security for dominant cyber espionage attack vector

Blue Coat Systems has added Mail Threat Defense to its portfolio of Advanced Threat Defense (ATD) solutions. With the addition of mail threat defense, Blue Coat provides in-depth protection against the common trifecta of attack vectors – web, email and network –for unparalleled defense...

Read More
Safeguarding storage from unauthorised access

Lock & Key is part of Imation’s recently announced Secure Data Movement Architecture (SDMA™), which offers organizations a holistic approach to manage and protect high-value data from tampering, destruction, loss or leakage.

Read More
BeyondTrust adds clarity to reduce password management risks

PowerBroker Password Safe enables companies to glean threat analytics associated with privileged...

Read More
Value-added distributor to provide MSPs with specialist support for HP's Converged Infrastructure

Azlan, Tech Data Europe’s specialist brand for value-added distribution of enterprise...

Read More
Protectig digital information everywhere

Vera has emerged from stealth and unveiled its new data security solution built to give enterprises...

Read More
BeyondTrust helps University of Winchester strengthen security without hampering productivity

Least privilege model reduces security risk and supports overhead for a top 20 university.

Read More
Cisco launches Advanced Malware Protection capabilities and Incident Response services

Cisco has unveiled a host of new capabilities and services that give security professionals...

Read More
Corero Network Security expands global sales and engineering teams

Corero Network Security has expanded its sales and engineering teams worldwide with the appointment...

Read More
The risk from business partners

Enterprises average 1,555 partners, and 30% of data shared is with high risk partners.

Read More
NEWS
Lessons to be learned from Zero-day nightmares

By Philip Lieberman, President & CEO Lieberman Software.

Read More
A Good solution for mobile security

Good’s secure container solution provides the answer for global insurance provider to replace...

Read More
Thales launches BYOK Deployment Service for Microsoft Azure Cloud applications

Bring your own key capability enables you to have total control over your keys and sensitive data...

Read More
MITA security tender awarded to 6PM  

AlienVault USM selected to extend the security management of the Malta Information Technology...

Read More

Videos

In this interview, Devang Mehta, Co-Founder & Director of Operations and Customer Success at Infrassist, explains how MSPs can move beyond reactive operations to build structured, scalable frameworks for...
Robert Schuetzle, CEO of Infinium, explains that, as power densities of GPUs, CPUs and supporting components continue to rise, cooling has emerged as one of the primary constraints to data centre performance,...
In this conversation, Sam Lambert, EMEA Channel Director at Gigamon, and Richard Betts, Founder and CEO of Vizst Technology, share candid insights into how AI is reshaping security operations. They explore...
Arturo Oliver, Sr. Director of Market Strategy & Analyst Relations at ScienceLogic, discusses why the edge is becoming the new frontier for observability- and what that shift means for enterprises trying to...

Expert Opinions

By Will Morey, Managing Director at Gamma Business.
By Russell Gammon, Chief Innovation Officer at Tax Systems.
By George Tziahanas, AGC and VP of Compliance at Archive360.
By Brian O’Hare, Service Director at BCS Consultancy.