Logo
Security enhancements for Thunder ADC portfolio
  • Published in

New features enable organizations to keep up with evolving security threats and compliance standards required to protect brand, intellectual property, and revenue.

Read More
Worldwide IT market showing tentative signs of improvement

According to the newly published International Data Corporation (IDC) Worldwide Black Book (Doc #250222), recent volatility will gradually give way to a more positive outlook for IT spending in the second half of 2014. With the U.S. and other mature economies mostly heading in the right direction...

Read More
Firehost appoints EMEA VP

FireHost, the secure cloud provider, has appointed Eleri Gibbon as Vice President of EMEA. In this position, Gibbon oversees FireHost's business in the region, including all aspects of sales, business development, partners, and support.

Read More
entrustIT certifies against the CIF Code of Practice

APM Group, the Cloud Industry Forum’s (CIF) independent certification partner has announced that entrustIT, a provider of hosted desktops & other cloud services, has certified against the CIF Code of Practice, demonstrating its commitment to transparency, accountability and capability in...

Read More
SanDisk and Super Micro Computer announce design win for ULLtraDIMM

SanDisk Corporation and Super Micro Computer, Inc. have announced that the SanDisk...

Read More
Kroll joins “Bit9 + Carbon Black Connect” Alliance Program

Kroll uses Carbon Black to rapidly detect and respond to attacks and accelerate remediation efforts...

Read More
AMD unleashes ‘world’s most powerful’ server GPU for HPC

AMD FirePro™ S9150 server card delivers up to 2.53 TFLOPS of peak double-precision floating...

Read More
SSE Telecoms appoints new MD

SSE Telecoms has appointed Colin Sempill as managing director. Colin will succeed SSE...

Read More
A10 Networks and Webroot partner

A10 customers can satisfy security and regulatory requirements by decrypting SSL traffic while...

Read More
Watchful Software releases RightsWATCH 6.0

Offers enhanced BYOD and MDM capabilities.

Read More
Cisco report highlights weak links in increasingly dynamic threat landscape

The Cisco 2014 Midyear Security Report examines the "weak links" in organizations that...

Read More
Improving backup-as-a-service and reducing costs

NAKIVO's multi-tenancy and self-service have saved Systemec more than 20% in operational data...

Read More
Basho introduces Riak CS 1.5

Distributed cloud storage software adds additional Amazon S3 compatibility, performance...

Read More
Alert Logic helps clckwrk secure business critical Oracle applications

Alert Logic Intrusion Detection and Log Management capabilities improve Oracle business application...

Read More

Videos

Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...
Data Centre World 2026
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...
Oliver Simonnet, Lead Cybersecurity Researcher at CultureAI, discusses the findings of the company’s The State of Enterprise AI Usage: The Illusion of Control report, which reveals a growing gap between how...

Expert Opinions

By Roy Azoulay, Co-founder, Chief Information & AI Officer at Cynomi.
By Chris Carreiro, Chief Technology Officer, Park Place Technologies.
By Dan Bridges, Technical Director, Dropzone AI.