Editor interview stories - Page 62
Bringing security to the next-level of networking
Tue, 11th Dec 2018
#
firewalls
#
network infrastructure
#
network security
By securing your network at the DDI level, you can prevent DNS attacks, data exfiltration, and put a barrier around every connected device.
How Philips IT solutions are reinventing healthcare
Mon, 10th Dec 2018
#
datacentre infrastructure
#
martech
#
healthtech
Philips is revolutionising healthcare by integrating adaptive technology and data systems for a more connected, efficient, and patient-centred approach.
New product from HID Global sets new speed records
Wed, 5th Dec 2018
#
iam
#
cybersecurity
#
printing
HID Global has unveiled a new ID card retransfer printer that truly sets the bar for speed by halving the current industry standard.
Why it's worth harnessing Intelligent Automation
Tue, 4th Dec 2018
#
it automation
#
iqpc
#
mapp
Intelligent Automation spending is predicted to reach $232 billion by 2025, up from the current $12.4 billion, according to a report by KPMG.
CASE STUDY: How Ricoh avoided disruption by meeting changing business needs
Wed, 28th Nov 2018
#
document management
#
hybrid cloud
#
ecm
Ricoh Hong Kong is a document management solutions and IT services provider that needed to evolve its product portfolio to be more dynamic and agile.
Corporate data more at risk due to a mobile workforce
Fri, 23rd Nov 2018
#
endpoint protection
#
casb
#
risk & compliance
Enterprise data faces unprecedented risk as the mobile workforce grows, with personal devices accessing critical infrastructure, says security experts, Lookout.
Interview: SevOne's Jim Melvin talks digital transformation
Thu, 22nd Nov 2018
#
digital transformation
#
sevone
#
network monitoring
SevOne helps businesses through digital transformation, aiding global network and data center operations teams in achieving their goals.
Phishing: It's all too easy on mobile devices
Thu, 22nd Nov 2018
#
endpoint protection
#
phishing
#
email security
Phishing attacks are surging on mobile devices, with 56% of users last year falling prey. Yet, firms like Lookout are stepping up with robust defences.
Why endpoint security is critical in a post-perimeter era
Thu, 22nd Nov 2018
#
malware
#
endpoint protection
#
casb
Traditional perimeter-based security strategies – once the backbone of enterprise security – simply no longer apply.
Accountant automates grunt work by coding an application
Thu, 22nd Nov 2018
#
coding
#
next academy
#
devs
Accountant uses coding skills to create app that revolutionizes workflow at Big Four firm, disbands 40-person team. @nextacademy.
Cyber crisis continues unabated – is ATP the answer?
Thu, 15th Nov 2018
#
firewalls
#
network security
#
advanced persistent threat protection
Statistics on cybercrime certainly makes for grim reading, and that is set to continue unless businesses take measures to stack the odds better in their favour.
Five major risks of letting shadow IT go unchecked
Thu, 15th Nov 2018
#
data protection
#
casb
#
cybersecurity
A department creating its own bespoke IT solution may sound like a good idea, but are the risks really worth it?.
Simple, scalable and secure DDI - next level network management
Wed, 14th Nov 2018
#
network infrastructure
#
sdn
#
naas
Infoblox has been the market-leading provider of DDI management for years. Now, thanks to their extensive R&D, they have taken it to the cloud.
Gartner names Silver Peak Leader in WAN Edge infrastructure
Wed, 14th Nov 2018
#
network infrastructure
#
sdn
#
edge computing
Gartner has named Silver Peak a leader in its 2018 Magic Quadrant for WAN Edge infrastructure, spotlighting its advanced SD-WAN and vCPE platforms.
Interview: Mobile Mentor CEO shares mobility strategies
Wed, 14th Nov 2018
#
partner programmes
#
healthtech
#
microsoft
Mobile Mentor, a mobile solutions company, has been named a Microsoft Co-Sell Ready partner, enabling them to build custom mobile apps with high security.
Interview: Building secure apps from the ground up
Tue, 13th Nov 2018
#
mfa
#
iam
#
apm
Building secure apps from the ground up is crucial as digital transformation empowers firms to automate. Mobile Mentor's Liz Knight discusses key strategies.
How to effectively implement a software-defined secure network
Mon, 12th Nov 2018
#
firewalls
#
network infrastructure
#
network security
Juniper responds to failing corporate defences, offering a unified cybersecurity platform that evolves with threats.
Paessler protects world's most precious computing artefacts
Mon, 12th Nov 2018
#
paessler
#
network monitoring
#
prtg
Without air conditioning, The National Museum of Computing must keep a close eye on environmental factors like temperature, humidity, and UV light levels.
The five-step guide to securing data in the cloud - IDC
Mon, 12th Nov 2018
#
migration
#
cloud security
#
multi-cloud
Cloud's rise brings hybrid and multicloud challenges, IDC and Forcepoint guide on secure cloud data transition.
Interview: Mobile Mentor's long term future with Microsoft
Thu, 8th Nov 2018
#
healthtech
#
microsoft
#
mobile mentor
Mobile Mentor is now a Microsoft Co-Sell Ready partner, bolstering global enterprise mobility with top-tier tech.