Logo

Hosted VoIP can not be left to the mercy of the public internet, warns Claranet

  • Published in

Network integration critical to ensuring reliability of service for hosted voice solutions and safeguarding corporate reputation.

Read More

Huddle Desktop makes Cloud-collaboration 'easier than ever'

  • Published in

Including deeper integration with Microsoft Office, Huddle Desktop connects the user’s desktop experience to the industry’s most powerful cloud-collaboration platform.

Read More

Coreix announced as key managed hosting and connectivity partner of (BDX) Brighton Digital Exchange

BDX to offer Brighton businesses enhanced connectivity in the local region.

Read More

Enterprise Cloud migration spurs infrastructure-as-a-service double-digit growth

  • Published in

Providers update their service portfolio to align with long-term cloud strategies and to gain a competitive edge.

Read More

Lack of surprise over poor security

  • Published in

Research conducted by Varonis Systems found that over 50% of IT security professionals are not surprised that end users have access to more company data than they should have.

Read More

Cloud commitment costs less

  • Published in

On-demand cloud pricing has fallen just 2.25% since October 2014, while the cost for customers that commit has dropped 12%.

Read More

Phoenix has been confirmed as a supplier for the RM1557v, the Government’s procurement...
Die Suite bietet Unternehmen und Serviceprovidern skalierbare und flexible virtualisierte...
Dimension Data accelerates the development of a true VCaaS offering.
Gemalto launches first HSM purpose-built for hardware-based key management in the cloud.
Cloud Marketplace launches in France, Netherlands and UK, with Microsoft Office365 and other Cloud...
Leading SME software specialist CloudToo® has announced the launch of a Cloud Readiness...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more