Cloud Computing

Seven steps to the optimal managed services practice
The growing popularity of cloud-based infrastructure and managed services is driving a new model when…

Vista Equity Partners to Acquire Ping Identity
Acquisition Will Accelerate Growth and Innovation for Identity Defined Security Leader Ping Identity has announced that…

Cloud ERP System for Enterprises – Key Considerations
Executive Summary In the past decade, companies have increasingly been opening factories and offices in China,…

Check Point Recognised as a Leader for Vision and Execution in the 2016 Gartner Magic Quadrant for Enterprise Network Firewalls
Check Point Software Technologies has announced it has once again been positioned as a Leader in the…

Juniper Networks Expands Unite Architecture with New EX Series Switches to Simplify Network Operations
New EX2300 and EX3400 Access Switches Combined with Junos Fusion Enterprise Support Streamlined Management Across…

Wedge Networks Highlights Security Service Orchestration as Key Enabler of Cyber Security Innovation
Orchestration from the Cloud that Mitigates Risk for Service Providers and Enterprises Proves to be…

Five ways the cloud is helping retailers meet customer demands
Retailers can be more innovative, and satisfy the growing customer demand for real-time information and…

Keeping your information secure in the cloud
Effective communication skills are probably the most As the industry shifts to procuring IT services…

Research reveals organisations fail to prioritise security
Security is one of the most important technology investments businesses can make. However, recent research…

Dell Releases Advanced Threat Prevention for the Next Generation of Growing Businesses with Dell Data Protection
Dell Data Protection | Threat Defense proactively prevents the latest advanced persistent threats and malware…

Ixia announces CloudLens platform to deliver visibility across private, public, and hybrid clouds
Ixia has announced CloudLens, a platform consisting of existing Ixia solutions and planned products that will…

As traditional perimeters are redefined, privileged access security is key to securing the hybrid enterprise
Centrify has released findings from a commissioned study conducted by Forrester Consulting, on behalf of Centrify,…

IBM Watson to Tackle Cybercrime
Eight Leading Universities to Help Train Watson for Cyber Security IBM Security has announced Watson for Cyber…

Red Hat opens Canberra office to bring open hybrid cloud solutions to broader market in ANZ growth
Red Hat has announced the opening of its Canberra office. The office was opened in response…