Five reasons for including secure workspaces in BYOD deployments

  • Published in

Dell advocates the use of secure enterprise workspaces in BYOD environments to help organisations balance employee expectations, business goals, IT requirements and security needs. Today, a plethora of options exist for providing employees with the software and other enterprise resources needed to do their jobs. A secure workspace, however, is the most effective approach for accommodating employees’ needs for anywhere, anytime access to corporate data and resources while also elevating...

Read More

Fujitsu targets ‘online-data-hungry customers’

  • Published in

Fujitsu has announced its plans to deliver new storage appliances providing customers needing instant online access to large data volumes with a new hyper-scale, software-defined storage solution based on Intel® technologies and utilising Ceph open-source software.

Read More

Use the new EU Data Protection reforms to secure funding for IT security, says Databarracks

  • Published in

The EU is to impose new data protection legislation to ensure better protection of the personal information of all EU citizens. The reforms will come with more severe fines for organisations that suffer data breaches. Peter Groucutt, managing director at Databarracks, claims that this is the tool IT professionals can use to drive-through security changes, as failure to do so will now result in severe repercussions: “Often, the fines imposed on organisations that suffer data breaches are...

Read More

Elitetele.com launches managed firewall services to help firms secure increasingly complex IT landscape

  • Published in

Elitetele.com has introduced a suite of unified threat management (UTM) solutions, including next generation firewalls, for IT teams struggling to secure a rapidly-evolving IT landscape.

Read More

Acronis acquires BackupAgent, strengthening cloud backup offering for service providers

  • Published in

With the acquisition of BackupAgent, Acronis enables service providers to offer the most complete cloud backup solution to customers of any size.

Read More

Blue Coat reveals security risks from “One-Day Wonders” websites

Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the majority of these “One-Day Wonders” are the backbone for how Internet content is shared and delivered, the sheer volume provides cover for malicious activity, including communication to infected systems.

Read More

NetCore has entered in to an agreement to take data center space in Istanbul One, Zenium's...
Self-service capability complements the One DevOps Platform; accelerates cloud adoption and app...
The latest research from Claranet suggests that as many as half of British organisations that look...
Healthcare workforce platform used by 37,000 clinicians supports staffing for the U.K.’s National...
Gigamon Hawk integrates with Riverbed to address the complexity of embracing hybrid and private...
According to the results of IBM's new global study on cloud transformation there has been a drastic...
Latest Video

Solve 2015: London - Andy Williams, Rackspace

Solve London - How Great Support Matters in a SaaS World.

Read more