Logo

Redcentric redefines product offering for G-Cloud 7

  • Published in

Awarded place on latest version of the public sector cloud buying framework.

Read More

CentriLogic acquires Advanced Knowledge Networks

  • Published in

Canadian managed IT services provider enriches CentriLogic’s portfolio with the addition of highly-secure managed infrastructure, cloud, and private network services.

Read More

Netskope equips organisations for EU GDPR compliance

  • Published in

Company also provides complimentary GDPR readiness kit with white paper, compliance checklist, webinar, and in-person seminar workshops.

Read More

NEWS

Cloud Price Index reveals a 74% saving by using multiple cloud providers

  • Published in

New report gives buyers and sellers insight into the savings that can be made by shopping around for the cheapest services for each part of a Web application.

Read More

Cisco opens second London office

  • Published in

Expands cloud-based technology division.

Read More

Orchestrated threat management

  • Published in

A powerful new combination of big data analytics, intuitive threat visualization, automated learning, and real-time threat intelligence distribution further enhance Wedge Cloud Network Defense™ for agile, assured and orchestrated threat management.

Read More

Fanatical Support® and open source expertise critical to the British business’ continued...
NTT Com Security research shows company insurance failing to cover for security beaches.
Leading Vendors, Solution and Service Providers to meet in Amsterdam in May 2020.
Standards consortium, The Open Group, has launched a new accreditation process aimed at setting the...
Complexity of delivering IT services keeps CIOs from operating on a more strategic level.
Vodafone has implemented CyberArk to protect and manage its privileged accounts, identities and...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more