UK channel providers over-reliant on vendors

38% of resellers do not or will not collaborate with fellow service providers.

Read More

LogRhythms neue Identity Interference Engine verknüpft Benutzer-IDs mit Security-Ereignissen

  • Published in

LogRhythm 6.2 hilft dabei, auf Cyber-bedrohungen noch schneller und effizienter zu reagieren. Die neue und leistungsstärkere Version der führenden Security-Intelligence-Plattform bietet zudem eine für Mobilgeräte und Web-Browser optimierte Benutzeroberfläche, die alle wichtigen Informationen kompakt präsentiert

Read More

Unzufriedene Kunden durch ineffizientes Papiermanagement

  • Published in

Einer Iron Mountain-Studie zufolge verlieren Unternehmen ihre Kunden, weil sie ihr Papier nicht in den Griff bekommen

Read More

Company culture is holding back the Connected Business, not technology

Enghouse Interactive survey reveals culture and structure is inhibiting the growth of connected businesses, despite most organisations going social.

Read More

Software takes centre stage

New user-vendor forum set to define and promote OpenFlow-based, merchant-optical networking solutions, offering unprecedented orchestration of packet and optical technologies for next-generation data centers and cloud service providers.

Read More

Tech Data Europe appoints SVO, Operations

Johan Vandenbussche will report to Néstor Cano, President Europe.

Read More

The future of the CIO and their business is dependent on their ability to take control and become...
“Securing the New Hybrid Workplace” report from Entrust found 91% of employees are in favor of...
New IBM Cybersecurity Software Lab in Israel will focus on mobile and application security,...
Business leaders are becoming increasingly conscious of the impact cybersecurity can have on...
Allows companies to maintain ownership and control of encryption keys and enforce data protection...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more