Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Inside the real economy behind fake Twitter accounts

    Some people do it just out of simple competition, essentially throwing their money away so they can boast more Twitter followers than their friends. Others do it to boost their corporate profiles, while even more high-profile cases have led to better reputations in the world of online clout, and thus job opportunities and advertising revenue.

  • Top 10 enterprise applications for public clouds

    Once you address security and privacy concerns, there are a number of applications, regardless of your business, which you can comfortably and safely move to the public cloud.

  • Six security companies you should watch

    Here are brief descriptions of a half-dozen security companies to watch, what they can do for enterprises and why they are worth keeping an eye on.

  • Taking back privacy into consumer hands

    Do-Not-Track bills are significant not because they regulate tracking of users, but because they shift the power and control from large anonymous databases to the user's own browser.

  • Epsilon attack - a turning point for the online marketing industry?

    Last week, consumers in the US were bombarded with email messages warning them of what may be the most widely felt data breach in US history. A company that most of them had never heard of, Epsilon Interactive, had been compromised and their names and email addresses had been stolen.

  • IPv6 has a long way to go

    There's maybe never been a better time to be a network engineer, that is provided you have IPv6 experience.

  • Five top open source group collaboration suites

    Messaging and groupware is at the heart of business and applications most people use everyday. While the big names like Microsoft Exchange, Lotus Notes and Google Apps are increasing their influence, enterprises have several viable open source options.

  • Facebook Messages: Why you should run away

    Facebook said its new messaging system is blurring the line between email and social networking, but that decision is the worst thing that ever happened.

  • Deep Packet Inspection

    Deep packet analysis has made its presence in traffic management and network analysis. What does it mean and how does it work?

  • CAPTCHA security - more worthless by the day

    CAPTCHA used to be an easy and useful way for web administrators to authenticate users. Now it's an easy and useful way for malware authors and spammers to do their dirty work.

Featured White Papers

11 cool things your firewall should do

Traditional stateful packet inspection firewalls focus on blocking network layer threats by evaluating the ports and protocols used by network layer traffic. The latest Next-Generation Firewalls utilize deep packet inspection to scan the entire packet payload to provide advanced intrusion prevention, antimalware, content filtering and anti-spam.
Download whitepaper

Cost effective security and compliance

While encryption and access control are key components to protecting data, even the best security systems are not complete without a monitoring system in place. Just as video cameras supplement audible alarms inside and outside businesses, monitoring what happens inside the database as well as what requests are inbound to the database are core to the principle of trust-but-verify as well as protecting against SQL injection attacks.
Download whitepaper

Email: The No.1 threat vector

The very best anti-spam solutions today deliver 95% effectiveness. Unfortunately, that's not good enough. A border-line attack that gets through a 5% gap in defences could cost your organization millions in terms of business lost, exposure to privacy threats, and brand loyalty.
Download whitepaper

Spam 2011: protecting against new threats

The very best anti-spam solutions today deliver 95% effectiveness. Unfortunately, that?s not good enough. A border-line attack that gets through a 5% gap in defenses could cost your organization millions of dollars in terms of business lost, exposure to privacy threats, and brand loyalty.
Download whitepaper

Cost-effective solutions for security and compliance

Information ranging from trade secrets to financial data to privacy related information has become the target of sophisticated attacks from both sides of the firewall. While most organizations have deployed firewall, intrusion detection, and anti-spam technologies, protecting data now requires a defense-in-depth strategy that also addresses regulatory compliance.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map