Brandentwicklung, Stromausfälle, Einbrüche: Unternehmen sollten Betrieb von Rechenzentren externen Spezialisten überlassen

Brandentwicklung, Stromausfälle, Einbrüche: Ob für die Website, das Intranet oder den Einsatz von Anwendungen im Netzwerk - an dem Betrieb eines oder mehrerer Server kommt heutzutage kein Unternehmen mehr vorbei

Read More
Der Informationsrisiko-Index:

Warum die Bewertung von Informationsrisiken für mittelständische und große Unternehmen entscheidend sein kann

Read More
Höchste Sicherheit für Patientendaten: HS256S stellt "digitale Schweigepflicht" in Arztpraxen sicher

Wer zum Arzt geht, der muss vertrauen: In erster Linie in die Kompetenz und Professionalität des Mediziners. Aber auch darauf, dass dieser Daten zur Person und Diagnose nicht nur vertrauensvoll behandelt, sondern auch zuverlässig schützt

Read More
Managed Services & Hosting Summit 2013 – initial sponsors and keynote announced

Sponsors include: AVG, Autotask, Dot Hill, EVault, Gigamon, Interxion and Tarmin; Tiffani Bova, VP...

Read More
Enterprises sitting on security ‘time bomb’

Companies are at serious risk of data security breaches as 43 per cent of UK office workers admit...

Read More
Wearable tech will drive the rise of the ‘human cloud’ of personal data

Rackspace Hosting has announced findings of an in-depth study into the use of wearable technology...

Read More
Bull signs service contract with the Tele Columbus Group

The five year contract will ensure the stability of IT operations at the Berlin-based cable network...

Read More
DP World selects Dimension Data

Solution includes, design, build and support of port network infrastructure including a secure Data...

Read More
The Green Grid takes giant StEP towards e-waste leadership

Collaboration with e-waste think tank aimed at educating organisations on electronic equipment...

Read More
ISACA issues COBIT 5 for Assurance

Establishing confidence in IT processes and controls is important, but audit and assurance...

Read More
Chip-to-application transformation

McAfee introduces two new suites: McAfee Complete Endpoint Protection – Enterprise, and...

Read More
Small to mid-sized business IT budgets surge 19 percent

Hardware purchases drive increase in spending; backup/recovery software and tablets show strong...

Read More
Simplifying mobile security

McAfee has announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software)...

Read More
Carmarthenshire County Council chooses Trustwave

Carmarthenshire County Council recently chose Trustwave SIEM (Security Information and Event...

Read More

Videos

DCW Asia 2025 - Part 2 of 3
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Alex Walsh, Regional VP of Channel Sales, EMEA North at Keepit, discusses the company’s channel-first strategy, broad SaaS data protection, and how MSPs can differentiate amid consolidation and cyber risks,...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...

Expert Opinions

By Simon Seymour-Perry, CEO of Logica Security.
By Kirsty Biddiscombe, EMEA Business Lead AI, ML & Data Analytics, NetApp.
By Adhum Carter Wolde-Lule – Director at Prism Power Group.
By Markus Nispel, Head of AI Engineering & EMEA CTO, Extreme Networks.