Logo
Watchful Software extends RightsWATCH security solution for Microsoft Azure users
  • Published in

New release brings significant new features in support of Microsoft Azure AD and Azure RMS including expedited deployment, more comprehensive forensics and reporting, and deeper mobile support.

Read More
Private cloud builds a strong foundation for hybrid cloud future

According to Current Analysis, companies have been slow to adopt public cloud based on security concerns, but private cloud solutions offer self-service flexibility, combined with data security.

Read More
Capita recognised as Cisco Physical Security Authorised Technology Provider Partner in the UK
  • Published in

Capita IT Enterprise Services has achieved Physical Security Authorised Technology Provider (ATP) status from Cisco. This designation recognises Capita as having fulfilled the training requirements and programme prerequisites to sell, deploy and support Cisco Physical Security products and...

Read More
In 2015 businesses will start to understand the importance of data classification

2015 predictions come from Bob Plumridge, EMEA CTO at HDS, and also chairman of SNIA Europe.

Read More
IT managers’ toolkit: Guide to Managed Network Security

IT is a revolving door of change. While most industries have had to get on board with the digital...

Read More
Going beyond digital

Richard Potter, Group Innovation Director at Steria, offers his technology predictions for 2015 and...

Read More
Mobile ransomware, work-at-home fraud and horrid videos could claim new victims

Mobile ransomware, targeted job fraud and Trojans lurking behind shocking videos are all expected...

Read More
What’s in store for security in 2015?

asks Keith Graham, CTO for SecureAuth.

Read More
AppRiver predicts 2015 threat landscape

AppRiver - a leading provider of email messaging and Web security solutions, has issued its...

Read More
The identity and access management market in 2015

The Identity and Access Management (IAM) Market continues to grow, with analysts predicting a...

Read More
Proofpoint cybersecurity predictions for 2015

2014 was a year in which information security vaulted into the public eye, driven by a surge in...

Read More
2015 to mark the year of disruptive technology, says Advanced 365 report

Internet of Things, Intercloud, Avatars and Software Defined Networks to dominate business agendas.

Read More
NEC identifies 2015’s Top 10 strategic technology trends for the smart enterprise

IT & Communications core components for businesses enhancing productivity, services and...

Read More
Survey Reveals 1 in 5 employees 'going rogue' with corporate data

According to SailPoint’s 7th Annual Market Pulse Survey, companies around the world have...

Read More
European survey finds use of Public Cloud Services continues to increase despite security concerns

A recent survey commissioned by Barracuda Networks, Inc., and conducted by Techconsult, highlights...

Read More

Videos

Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
DCW Asia 2025 - Part 1 of 3
Steven Heinsius, Vice President of Product Management & Marketing EMEA, explains what sets the new Cisco 360 program apart for MSPs. He highlights how it enables outcome-driven managed services and shares...
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...

Expert Opinions

Global Commissioning’s CEO Louis Charlton’s latest article comes during National Apprenticeship Week, as the importance of building up our next generation of talent’s skills for data centre facilities is...
By Vijay Narayan, EVP and Americas MLEU Business Unit Head at Cognizant.
By James Gillies, Head of Cyber Security at Logicalis UK&I.