Lancope strengthens Cisco pxGrid support

Lancope, Inc. is providing tight product integration with the new Cisco Identity Services Engine (ISE) 1.3, unveiled this week at Interop New York as part of the Cisco Cyber Threat Defense (CTD) Solution 2.0. Cisco ISE is a powerful and flexible attribute-based access control solution that provides...

Read More
Kaseya Release 8 delivers ‘leading’ security and compliance management

Kaseya has announced the availability of Release 8 of its product portfolio. In addition to delivering innovations across Kaseya's core IT, cloud and remote management solutions, this product enhancement builds on Kaseya's recent acquisition of Scorpion Software, with additions to the...

Read More
Majority of organisations not confident in ability to protect data after a breach

74 per cent of IT decision-makers believe perimeter security is effective at keeping out security threats, yet 41 per cent believe unauthorised users are able to access their networks.

Read More
Multi-terabit per second mitigation capacity expansion

Arbor Networks, Inc. has announced a significant capacity expansion program for the Arbor CloudSM...

Read More
Dell and Oracle help customers deploy Oracle Business Intelligence Applications

Dell Integrated Systems for Oracle Business Analytics dramatically speeds deployment, management...

Read More
Lack of IT policy on devices putting companies at risk

New research from data recovery specialists, Kroll Ontrack, reveals how companies that don’t...

Read More
Large number of UK companies still in the dark on security

Nearly 10% of UK companies don’t know how many security breaches they have suffered in the...

Read More
CIOs should be kept awake at night by growing the top line

A recent survey has revealed that CIOs are twice as likely to focus on delivering IT services to...

Read More
£2.5 million to recognise and reduce cyber-attack threats to critical infrastructure

New research co-funded by the Engineering and Physical Sciences Research Council (EPSRC) will focus...

Read More
The Logic Group Maximises payment security

Point-to-Point Encryption reduces merchants’ vulnerability to a data breach or failed audit.

Read More
SignNow appliance brings Cloud Workflow Management to organisations

Barracuda Networks, Inc. has announced the general availability of Barracuda SignNow version 4.0...

Read More
Proact to launch in Germany

Proact will be active in Germany as of 1 October this year. The launch will initially take place as...

Read More
The shift to hybrid, app-specific IT

By Paul Vian, Business Development Director at Internap.

Read More
Oracle OpenStack for Oracle Linux now available

Enterprise-scale solution for OpenStack allows extended deployment options to best fit...

Read More

Videos

Ofir Bloch, VP at WalkMe, discusses the results of WalkMe’s fifth annual State of Digital Adoption report, which reveals that over half (54%) of workers bypassed AI tools and completed tasks manually at...
Thiri Shwesin Aung, founder and CEO of Nyxium, discusses how she and co-founder, Paul Seurin, have built an agentic AI platform that helps energy and infrastructure developers decide where projects are most...
Falk Weinreich, CEO of Portus Data Centers, discusses the company’s focus on the DACH region, with plans to accelerate expansion of their existing data centre portfolio – most immediately with the...
Edgar Van Essen, Managing Director, CCO and Partner for Switch Datacenters, outlines a dramatic decline in water use, new cooperative stakeholder models including green residual heat exchange networks, and a...

Expert Opinions

In this Q&A, Jamil Valliani, Head of Product for AI at Atlassian, discusses the company’s approach to AI, the role of context in enterprise workflows, and how tools like Rovo and Teamwork Graph are evolving.
By Sergei Serdyuk, VP of Product Management, NAKIVO.
DXC OASIS is an intelligent orchestration platform that integrates seamlessly across existing IT environments, connecting and actively managing organisations’ entire IT estates in real time.
Why visibility into supporting operational systems matters just as much as protecting core IT.