Anti-threat solution ensures the 'fastest' 100% removal of threats
  • Published in

Check Point has introduced Check Point Threat Extraction, a radical new security approach that proactively ensures documents are delivered to a network with zero malware in zero seconds.

Read More
Cloud Access Manager enables secure and convenient access to the applications users require, when they need them
  • Published in

Dell has released Dell One Identity Cloud Access Manager 8.0, which leverages Dell’s new Security Analytics Engine to give organisations control of web-based applications and OpenID Connect-compliant mobile application access activities within the organisation. This control improves security...

Read More
Corero strengthens DDoS defence technology
  • Published in

Corero Network Security has enhanced its SmartWall® Threat Defence (TDS) System, now delivering adaptive, analytics-driven DDoS protection for superior network intelligence and infrastructure availability. By algorithmically detecting and defeating emerging DDoS attack vectors, Corero is...

Read More
NEWS
BeyondTrust helps RWE Supply & Trading

Leading pan-European energy trading house meets tight budgetary and regulatory constraints through...

Read More
Proofpoint launches the Nexgate Social Media Threat Centre

Real-time console details social media threats, risk trends and security effectiveness for...

Read More
NEWS
Councils say current IT lacks the power to transform

Over half of local government senior decision makers are not confident future investment will be...

Read More
Clavister launches Security-as-a-Service firewall offering for Dutch Channel partners

Clavister’s pay-as-you-go service gives channel partners and VARs new revenue streams.

Read More
NEWS
The Catalan Institute of Nanotechnology protects its confidential data

Institute secures its networks and mobile devices using Check Point’s advanced threat...

Read More
NEWS
Application economy puts pressure on brands

The results of a global study reveal that brands are failing to understand the real needs of...

Read More
Integrating encrypted communications with VPN & EMM technology

saltDNA has launched a technology which it says is is set to revolutionise how global enterprises...

Read More
New level of network visibility offered through the Cloud

Masergy Communications Inc. has introduced advanced threat management capabilities for its managed...

Read More
Blue Coat launches Encrypted Traffic Management Ready Certification Program

ETM Ready will generate best-in-class solutions for combating security threats hidden in encrypted...

Read More
Wipro collaborates with WEF 

Wipro Ltd. has been working with the World Economic Forum (the Forum) partner companies to...

Read More
Juniper Networks and Amdocs showcase joint virtualized customer premises equipment

Juniper Networks and Amdocs will showcase an automated virtualized customer premises equipment...

Read More

Videos

CEO Dave Gerry, and Dr David Brumley, Chief AI and Science Officer, both at Bugcrowd, discuss the findings of the recent “Inside the Mind of a CISO 2025: Resilience in an AI-Accelerated World” report,...
Francesco Marasco, VP Energy Operations and Sustainability, nLighten, explains why the European data centre provider has published the first ICFEn (Integrated Carbon-Free Energy) scores for its facilities,...
Rebecca Scottorn, Partner at L.E.K. Consulting and part of the global Industrials Practice, discusses the company’s recent ‘State of the Energy Industry’ report, providing valuable insights into a range...
Andy Venables, CEO at POPX, discusses the findings of a new survey of 250 MSP leaders by POPX, which reveals a significant shift in expectations for MSPs in 2026. Unsurprisingly, security and AI featured...

Expert Opinions

By Graham Jarvis, Freelance Business and Technology Journalist.
By David Davies, Associate Director at Arup.
AI’s true value starts with the right mindset. By Darin Patterson, VP of Market Strategy Make.