Novell announces strategic partnership with MobileIron for Secure Mobile File Access

Novell Filr integration with MobileIron AppConnect provides mobile users access to and ability to share files from any IT-approved device.

Read More


Beta release of Red Hat Enterprise Linux 6 now available

To keep pace with the demand for enterprise-class infrastructure, the newest version of the leading Linux platform, the beta release of Red Hat Enterprise Linux 6.5, extends its scalability and manageability to aid in the build-out and control of large, complex IT environments. For example, Red Hat Enterprise Linux 6.5 will be designed to simplify the operation of mission-critical SAP applications by automating the optimal configuration of common SAP deployments.

Read More



Global study shows need for C-level leadership

Capgemini Consulting, in partnership with MIT Sloan Management Review, has announced the findings of a new global research survey into Digital Transformation – the opportunity for radical business change offered by the convergence of new digital technologies such as social media, mobile, analytics, and embedded devices. The study, “Embracing Digital Technology: A New Strategic Imperative,” reveals that while the potential opportunity of Digital Transformation is absolutely...

Read More

TeamQuest has announced the results of their Global IT Management survey with indicators on how IT...
Security updates from Lancope’s research team help customers combat today’s...
US pipeline cyberattack is a ‘timely reminder’ highlighting the need for cyber insurance,...
Grant Thornton has announced the creation of a global technology industry group. The group will...
Imperva, Inc. has released Imperva SecureSphere File Firewall v12 with real-time deception...
94% of IT professionals feel perimeter security is effective at keeping unauthorised users out of...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more