Logo

The Edwardian Group London improves guest experience

New communications platform supported by Dell Storage and Dell Servers improves communication between guests and staff.  

Read More

HP accelerates partners’ path to growth

Five reasons to get excited about HP PartnerOne in 2014.

Read More

Finance industry remains vulnerable to cyber attacks

  • Published in

Defence plans should be made around an asset based approach.

Read More

On-demand penetration testing

  • Published in

Trustwave has rolled out a new subscription-based, penetration testing service that can more efficiently and regularly identify security weaknesses within networks and applications so businesses can make improvements that better protect themselves from cybercrime, data loss and other security risks.

Read More

Channel challenged in hybrid IT model

The channel has to change; it has been guilty of keeping cloud away from smaller and mid-sized businesses. New routes to market are by-passing both IT departments and traditional channels, however just as channel selling methods need updating; it is likely that most salespeople won't survive the transfer to the new models.

Read More

Egnyte announces “PRISM Prevention Program”

  • Published in

Includes free assessment & licenses to protect files too sensitive for the cloud.

Read More

The growth in ‘Shadow IT’ is leaving IT departments caught between a rock and a hard...
Many of today’s most destructive advanced persistent threats (APTs) were conceived a decade...
164% increase in stolen, lost or compromised records.
Kaspersky Lab researchers have examined the security of applications for the remote control of...
Dell SecureWorks has launched a white paper which seeks to overturn the myths surrounding data...
Research from Netacea reveals businesses don’t understand up to half of the traffic on their...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more