One experience can bind them

  • Published in

Sitel builds an omni-channel approach to enhancing customer experience

Read More

Trustis protects mobile and cloud services with Thales

  • Published in

Thales hardware security modules provide on-demand digital certificates to government agencies on UK G-Cloud.

Read More

IT leaders feel “locked in” with current IT outsourcing suppliers

Two thirds (65%) of IT leaders say suppliers are not open or approachable about renegotiation.

Read More

KONE Corporation moves to the cloud with T-Systems

KONE to source all IT services from the cloud in the future.

Read More

Colt heads east with launch of enterprise class cloud services in Asia

European customers able to deploy scalable IT services quickly and easily to support business expansion into Asia.

Read More

(ISC)²® introduces expert-level cyber forensics certification

  • Published in

(ISC)²® (“ISC-squared”), the world’s largest not-for-profit information security professional body and administrators of the CISSP® and CSSLP®, has developed a new certification, the Certified Cyber Forensics Professional (CCFPSM), as the first global standard for assessing experienced digital forensics professionals’ mastery and professionalism. The credential, initially available for the U.S. and South Korea beginning September 25, 2013, is designed to...

Read More

By Ian Tickle, ‎VP EMEA, SaaS Solutions at Oracle.
New data highlights that while appetite for software adoption is high, organizations are struggling...
First-quarter combined ACV, though flat sequentially, falls 20% year-on-year, to ˆ3 billion.
F5’s State of Application Services Report showed that 88% of surveyed EMEA organisations are...
Cyber attackers follow companies into the cloud; research shows 45 percent increase in...
Hybrid and multi-cloud architectures have become the de-facto standard among organisations, with...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more