Sanjay Uppal Velocloud.jpg

VMware charts networking's software-defined future for enterprises and service providers with intent to acquire VeloCloud

VMware will address end-to-end automation, application continuity, and security from data center to edge with industry-leading software-defined wide-area network (SD-WAN) solution

James Hamilton GEN15.JPG

Wedge Networks announces industry leader James Hamilton as CEO

New CEO to accelerate global growth in cloud security sector more
Fortinet NTT.jpg

NTT Com Security and Fortinet announce Global security partnership

Companies to jointly provide capabilities in cloud security, network risk management, SIEM, SDN and virtualization to companies globally more
more news


James Hamilton Wedge.JPG

Wedge Networks partners Bangkok Systems to bring Wedge Absolute Real-time Protection™ to The Royal Thai Army Hospital

Partnership will help defend businesses, governments and consumers against emerging advanced cybersecurity threats more
Marc Davis Jask.jpg

JASK brings AI-powered security platform to Europe in partnership with Ignition Technology

JASK Answers for Channel Partners, a programme designed to expand the availability of the autonomous security operations platform, launches in the UK more
David Goeckeler Cisco.jpg

New predictive analytics, assurance capabilities advance Cisco's strategy to reinvent the network for digital business

Mathematical modeling and contextual insights represent the next major advancement in intent-based networking revolution more
more products


Brian Lord OBE.JPG

The Mind of the Hacker - Insights from GCHQ, MI6 and Israeli Intelligence

It used to be the trickery of the disinterested joker – bright youngsters pulling the data strings just to see what would happen. Then came criminals, adapting old con-trickery and thieving skills to the new cyber environment. Then it escalated to international gangs and now we are faced with political interest and rival shaping a post-truth world. Where are we heading? What is already happening? Vital questions must be addressed in this opening session before we turn to the technologies, solutions and strategies for securing the Cloud and Internet of Things. Brian Lord, OBE – former GCHQ Deputy Director for Intelligence and Cyber Operations – begins by describing the big picture, how it is evolving and where we could be heading. How is the balance of knowledge and power changing? And how will this affect our industry, business and society?

Rohit Mehra.JPG

Ethernet in enterprise working

Ethernet has proved to be the answer, but can we clarify the question? A panel of senior execs from industry leaders spell out the key challenges facing CIOs in enterprise IT today –including virtualization, BYOD, management and security

Copia de IMGP8121.JPG

A Keene eye on cloud infrastructure, security, transport and content delivery

Last Summer, Gartner released their annual ”Hype Cycle” report, calling the hype around Cloud computing “deafening”! They say that nearly every vendor has a Cloud computing strategy, but few make it Cloud-centric. Indeed, ”cloudwashing” risks accelerating the entire industry into the trough of disillusionment - with the Amazon Web Services outages earlier this year as a case in turning point

more interviews


Robert Haim ACG and Panel.JPG

We must secure the Internet of Things before someone gets hurt

Dick Cheney, the former vice president of the United States, famously disabled wireless access to his heart pacemaker because he was afraid that terrorists could induce a heart attack. In the 2007 movie “Live Free or Die Hard,” criminals blocked traffic and caused accidents by turning all of Washington, D.C.’s traffic signals to green more
John N Stewart Cisco.jpg

Cisco Annual Cybersecurity Report reveals security leaders rely on and invest in automation, ML and AI to defend against threats

Findings show 39 percent of organizations are reliant on automation, 34 percent are reliant on machine learning, 32 percent are highly reliant on AI more
Jason Hart Gemalto.jpg

Gemalto and Ponemon Institute Study: Big gaps emerge between countries on attitudes towards data protection in the cloud

Study reveals regional disparities in adoption of cloud security: German businesses almost twice as likely to secure confidential or sensitive information in the cloud (61%) than British (35%), Brazilian (34%) and Japanese (31%) organizations. Half of global organizations believe that payment information (54%) and customer data (49%) is at risk in the cloud. Over half (57%) think using the cloud increases compliance risk

more articles