More News

ExtraHop helps GTA enhance travel services for a competitive edge

ExtraHop, leader in enterprise cyberanalytics, has announced that GTA, a leading distributor of travel products and services, is using ExtraHop to help enhance the speed and reliability of applications resulting in a superior user experience. GTA delivers amazing travel experiences to millions of global customers through its portfolio of accommodations, tours, excursions, attractions and more […]

Excel expands UK business development team

Excel Networking Solutions, the copper and optical cabling infrastructure provider, has announced further expansion of its UK business development team. Daniel McKeon has recently been promoted to Business Development Manager and will be covering central England between Leeds and Milton Keynes, including Wales and the West and East Midlands. Jason Holroyd, Director of Business Development […]

Veeam Software expands leadership in Cloud Data Management

Veeam Software, a leader in backup solutions that that enable Intelligent Data Management, has  announced the general availability for new cloud data management capabilities as part of Veeam Availability Suite 9.5 Update 4, as well as the upcoming Veeam Availability for AWS and Veeam Availability Console v3. The new major capabilities deliver cost effective data […]

AVORD research reveals views on the cost of security testing

Businesses across the UK have criticised the security testing industry for being too expensive, with a new report highlighting that firms are spending more than £6.6bn annually protecting critical assets from cyberattacks. Research from AVORD – a new security testing platform launched in January – puts the spotlight firmly on the security testing market, which […]

Telenet selects Teleste for upgrading its optical HFC equipment

Teleste Corporation has announced that it has reached an agreement with Telenet, one of the largest providers of cable broadband communication in Belgium, for supplying optical network products as part of an upgrade project to install 1,2GHz capable equipment in the optical section of the access network. Under the agreement, Teleste will supply optical transmitters […]

IFS extends field service offering with IFS Field Service Management 6

IFS, a global enterprise applications company, has announced the general availability of IFS Field Service Management 6. With major enhancements and new capabilities, it has been field tested and is already delivering value for early adopter customer Eickhoff, a market leader in technology and services for mining and gearbox applications. IFS FSM 6 brings to […]

Synopsys unveils enhancements to Coverity SAST solution

Synopsys has announced the availability of a new version of its Coverity static application security testing (SAST) solution, which enables organisations to build secure applications faster. The latest release of Coverity addresses three increasingly important needs for enterprise application security teams: scalability, broad language and framework support, and comprehensive vulnerability analysis. “While application vulnerabilities continue to […]

Kaspersky Lab reveals value of stolen identity information

While many of us have heard of – or even fallen victim to – cybercrimes such as data and identity theft, it seems that relatively few know the value of the information stolen from us. A new study from Kaspersky Lab has revealed that while our identity may not be worth a lot in terms of dollars, […]

Check Point expert on 2019’s cybersecurity challenges

By Andy Wright, Regional Director, Northern Europe at Check Point “Technology is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other,” wrote novelist and scientist C. P. Snow in the New York Times in 1971. It still rings true today. Every new tool […]

BeyondTrust CTO on using PAM in post-breach clean-ups

While no organisation wants to respond to a security incident or a breach – particularly at the start of a new year – the reality is that preventing a cyberattack from landing is not always possible. Morey Haber, CTO at BeyondTrust, discusses the role of privileged access management (PAM) in a post-breach clean-up. No one wants to respond to […]