Logo
eCommerce drives both top and bottom line for B2B companies

In addition to increasing company revenue, increases in profitability per order and average order value also cited as key findings.

Read More
Symantec development surge produces Mobile Threat Protection
  • Published in

Accelerated development creates new capabilities integrated with enterprise mobility management solution to deliver comprehensive protection, secure mobile productivity.

Read More
More than 1 in 8 IT security pros can access previous employers’ systems using old credentials
  • Published in

Just over 13 percent of IT security professionals admit to being able to access previous employers’ systems using their old credentials, a new survey from Lieberman Software Corporation reveals.

Read More
Worldwide Threat Intelligence Security Services spending to exceed $1.4 billion by 2018
  • Published in

A consistent bombardment of unknown, targeted, and adaptive cyber threats are wreaking havoc in the enterprise and driving the expansion of threat intelligence security services (TISS) that are specifically designed to detect advanced persistent threats (APTs), advanced malware, and previously...

Read More
IT managers now also handling telecoms in over half of cases

New industry survey reveals IT manager is also responsible for telecoms in 52% of businesses.

Read More
User-centric approach to protect, secure and manage mobile devices

Sophos has announced Sophos Mobile Control (SMC) 4.0, the first Enterprise Mobile Management (EMM)...

Read More
ARITHNEA: Zehn Faktoren für erfolgreichen Cross-Channel-Commerce

Cross-Channel-Commerce ist für den Handel heute ein Muss: Die Kunden haben diesen Trend...

Read More
PRTG Network Monitor überwacht die IT-Infrastruktur des T-Systems Innovation Center

Präsentieren unter reibungslosen Bedingungen: Seit kurzem überwacht PRTG Network Monitor...

Read More
Auch Versorger brauchen Grundversorgung: Quantum erneuert Backup-Umgebung der Stadtwerke Rosenheim

Eine Backup-to-Disk-Lösung mit zwei Quantum DXi Deduplizierungsappliances ersetzt die...

Read More
21. MTI Technology-Kongress: Sicherheit für das Big Data Center

Programm aus hochkarätigen Experten- und Anwendervorträgen erstmalig um IT-Security...

Read More
GFI Software verbessert Bewertung von Schwachstellen sowie Patch-Management mit LanGuard 2014 R2

Mit LanGuard 2014 R2 bringt GFI Software eine neue Version seiner preisgekrönten...

Read More
Lancope achieves Common Criteria EAL1 Government Certification

Company continues to maintain Common Criteria certification to provide highest levels of network...

Read More
Firehost appoints new Chief Security Officer

FireHost, the secure cloud provider, has appointed retired US Army Col. Jeff Schilling as chief...

Read More
Ekro chooses the storage and back-up solution from Proact

Ekro, part of the VanDrie Group, the global market leader in veal, has chosen Proact for the...

Read More

Videos

In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...

Expert Opinions

By Vijay Narayan, EVP and Americas MLEU Business Unit Head at Cognizant.
By Michael Fasulo, Senior Director of Portfolio Marketing, Commvault.
By James Gillies, Head of Cyber Security at Logicalis UK&I.
By Simon Seymour-Perry, CEO of Logica Security.