Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • The impact of the 'Internet of Things' on corporate IT

    The Internet of Things (IoT) is a broad concept plotting to make vast amounts of the physical world interactive, IP-enabled, and ?smart?, according to Forrester Research analyst Andrew Rose.

  • Information security: Seeking Sun Tzu's guidance

    There is a raging war in cyberspace. Hackers launch attacks for various objectives: hacktivism, extortion, fraud, or espionage. Targets may be random or targeted. It's only a matter of when one will fall victim to an attack

  • Windows 8 security focuses on early malware detection

    Security experts say Windows 8 is the most secure Microsoft OS to date, but that doesn't mean malware won't evolve to exploit it

  • Top 10 enterprise applications for public clouds

    Once you address security and privacy concerns, there are a number of applications, regardless of your business, which you can comfortably and safely move to the public cloud.

  • Is cloud-based security really cheaper?

    Vendors hope subscription models - and removing the need to manage and update software and hardware - will be attractive

  • Mobile device management - Tools and technologies for the BYOD era

    Mobile Device Management (MDM) is an increasingly important IT management discipline, particularly with the rise in mobile working and the Bring Your Own Device (BYOD) phenomenon.

  • Securing your hybrid cloud

    The debate over public cloud versus private cloud continues to rage within the IT industry. As most organisations take an ad-hoc, evolutionary approach to new technologies, the environment over the next five years is likely to be a mixture of the two.

  • Slow Flashback Trojan response is Apple's "Adobe moment"

    Apple could be experiencing an ?Adobe moment? over its handling of the Flashback Trojan, with security companies heaping criticism on the company for its slerotic response.

  • Is end point security a waste of time?

    The first board member at your organisation to walk through the door with an iPad did the IT team a massive favour. Put bluntly, there was no longer an argument. They had to ease the purse strings on your requests to fund management and security systems to go with your enterprise mobility projects.

  • Can Big Data be used to catch network invaders?

    The buzz in security circles about "Big Data" goes something like this: If the enterprise could only unite its security-related event data with a warehouse of business information, it could analyse this Big Data to catch intruders trying to steal sensitive information.

Featured White Papers

Intelligence network

Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional anti-virus software has become futile. More than 100,000 new types of malware are now released every day, and anti-virus vendors are racing to add new protection features to try to keep their protection levels up.
Download whitepaper

Think your anti-virus software is working? Think again

We've been so bombarded by computer viruses, worms, Trojan horses and other malware that we have become acclimated to their presence. We subscribe to an anti-virus (AV) offering and hope for the best. Trouble is, AV has not been keeping up. Studies show that even though most organisations use AV, more and more are succumbing to attacks.
Download whitepaper

Intelligent whitelisting

Intelligent whitelisting provides a unified workflow that brings signature-based and behavioral detection together with the power of whitelisting capabilities, and adds a ?trust engine? which controls what changes are allowed.
Download whitepaper

Security solutions

As the business world moves from the bricks and mortar defensible estates into cyberspace and the virtual world, has your company made similar controls to check and defend your assets?
Download whitepaper

Security and Control: The Smarter Approach to Malware and Compliance

The continuing evolution of malware threats combined with the demand for increasingly flexible working practices is a significant challenge to IT departments seeking to reduce help desk support and get better value for money from their investment in security. This paper looks at how organizations can benefit from a more integrated, policy-driven approach to protecting the network at all levels and controlling both user access and behaviour.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map