Growth in external threats, internal breaches and complexity of security
  • Published in

Findings show internal security issues are increasing despite attempts to curb breaches over past 12 months; growing complexity of security estates highlighted as a significant risk.

Read More
Offshore providers without a Cloud strategy risk long-term future

While the increased use of industrialised services will reduce the volume of traditional and customised services, the impact on offshore providers will be counterbalanced by new revenue from investments in cloud-based services, said Gartner, Inc. However, service providers that are slow, unable or...

Read More
Edge solution deliver sync, search and protection
  • Published in

CommVault Edge™ enhancements provide secure, self service access to corporate data from anywhere.

Read More
KEMP provides load balancing support for Macmillan Cancer Support
  • Published in

KEMP Technologies load balancers are providing a helping hand to keep the IT systems running smoothly at Macmillan Cancer Support. With over 1,500 office staff and homeworkers doing valuable work to help thousands of people affected by cancer, Macmillan has installed KEMP LM-2600 LoadMaster...

Read More
Acceleration ‘everywhere’

Riverbed Technology has extended its Steelhead® wide area network (WAN) optimisation product...

Read More
WatchGuard introduces Data Loss Prevention solution for Unified Threat Management

WatchGuard® Technologies has introduced a Data Loss Prevention (DLP) solution for its Unified...

Read More
Softcat becomes Juniper Networks Elite partner to provide enterprise networking solutions

Softcat has achieved Elite Networking Infrastructure Partner status in the Juniper Networks Partner...

Read More
NHS Wales secures information transfers, meets regulatory demands and enhances patient care

National Health Service of Wales extends use of Ipswitch File Transfer technology from 2,000 third...

Read More
Risk of unsupported systems

CIOs need to have well-developed OS migration plans.

Read More
Integrated protection and recovery for Caché® databases

Extends BridgeHead Software’s rapid and reliable management of hospital data to the many...

Read More
ISACA helps enterprises manage vendors using the COBIT 5 Framework

As enterprises increasingly rely on cloud service providers and other vendors to provide...

Read More
Cordys delivers improved business agility to FNV Bondgenoten

Largest Dutch trade union harmonizes scattered IT landscape with Cordys.

Read More
Flexiant Cloud Orchestrator V3.1.3 released

Latest version extends storage capabilities and enhanced dynamic workload placement to support a...

Read More
Caringo launches CloudScaler 2.0

Delivers robust features that make it the best choice for enterprises and service providers.

Read More

Videos

Michelle Buckingham, VP of Channel at IFS, discusses the company’s recent acquisition of TheLoops and its recent collaboration with TomTom before explaining how IFS is building a digital-first partner...
Steve Wilson, Chief AI and Product Officer at Exabeam, discusses the company’s recent report, From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025, explaining that there’s no shortage...
Gina Archbold, Channel Business Manager at BlueSnap, provides an update on the company’s Partner Program - explaining how the BlueSnap global payment orchestration platform provides an integrated, single...
Francisco Almada Lobo, Chief Executive Officer and Co-founder and Jeff Winter, Vice President, Business Strategy, both at Critical Manufacturing, provide some great insights as to the themes covered at the...

Expert Opinions

By Troels Rasmussen, GM of Security, N-able.
The Middle East is undergoing a huge shift in its engineering and infrastructure sectors, with chapmanbdsp perfectly poised at the centre of the region’s transformation.
Pulsant’s Natasha O’Brien explains why a resilient and sovereign digital infrastructure could represent the answer to escalating insurance costs.