Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • How cybercriminals and hacktivists use DDoS tools to attack

    Network professionals know that distributed denial-of-service attacks are an ever-growing danger. The recent assault on Twitter is just the latest evidence. Using a mushrooming array of advanced tools, including pay-per-use services and mobile devices, attackers are taking down websites, DNS and email servers, often using these tools to destroy a company's online revenue, customer service and brand reputation. But the technology is only half the story. The thinking that shapes attacks ? an evolving blend of careful planning, probing and improvisation?is often the difference between duds and strikes that leave victims begging for mercy.

  • The worst security muddles (so far) of 2012

    From the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches (think LinkedIn, eHarmony, Elantis, VMWare), security muddles have ruled the first half of 2012.

  • Online black markets and how they work

    The internet is no stranger to crime. From counterfeit and stolen products, to illegal drugs, stolen identities and weapons, nearly anything can be purchased online with a few clicks of the mouse. The online black market not only can be accessed by anyone with an internet connection, but the whole process of ordering illicit goods and services is alarmingly easy and anonymous, with multiple marketplaces to buy or sell anything you want.

  • Five ways you can extend your current storage gear

    Recent flooding in Thailand has affected many hard drive manufacturers, resulting in price hikes for hard drives of as much as 50 to 100 percent. How long this will last is unclear, but in the meantime, you can postpone new purchases of storage gear by implementing these methods to help reduce unnecessary files, reduce the space used on the system, and allow for expansion with existing systems.

  • Seven reasons to consider virtualisation

    Both server virtualisation and desktop virtualisation use a software core called a hypervisor to run multiple operating systems on the same physical server hardware. Each OS is kept separate, with resources dedicated as needed.

  • And still the spam comes...

    There is no end in sight to the phenomenon of spam. And the better filtering gets, the more spam that gets sent. So who is winning the spam war?

  • Putting botnets on notice

    Botnets are the scourge of the Internet, spewing spam and malware at every turn. They could also be malware?s weak link if ISPs wake up in time.

  • Special delivery: Keeping the email flowing

    The sheer volume of email now puts a staggering load on network and servers.

  • Juniper gets application-aware

    After its $470 million investment in WAN application acceleration, we quiz Juniper's European VP on just how the company will combine that with its other technology strands.

  • SPC-2 (plus IBM result)

    Here is a description of the Storage Performance Council's second storage benchmark, SPC-2, with an IBM benchmark result appended to it.

Featured White Papers

Securing Microsoft Exchange 2010 with VeriSign Authentication Services

This guide from VeriSign Authentication Services will help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
Download whitepaper

E-mail Archiving: Analysing Return on Investment

This white paper highlights some of today's most pressing e-mail management challenges, including bloated inboxes, redundant data storage, excessive backup activity, and lost productivity. The paper explains how an enterprise e-mail archiving solution alleviates these problems while delivering an attractive ROI. With EAS, you can:
Download whitepaper

An introduction to client firewalls

Increased connectivity in and out of the office has radically changed the task of securing an organization?s systems and data. Client firewalls ? often referred to as ?personal? firewalls ? are now an essential part of corporate endpoint security. This paper describes what a personal firewall is, why it is important, and how it differs from a gateway firewall.
Download whitepaper

Could Your Email Systems be Hindering Your Most Productive Employees?

This paper explains the importance of operational archiving of your email and IM communications and describes how you can ensure that your organization?s Information Technology (IT) department facilitates rather than hinders the productivity of your employees through the proper implementation of operational archiving. It concludes by explaining how Postini Integrated Message Management services deliver the key benefits of operational archiving as part of its many managed service advantages.
Download whitepaper

Introducing File Area Networks

This white paper contains information about File Area Networks (FANs) in general, and specific information about FANs built with Brocade products. It is also designed to be useful as a desktop reference for FAN administrators. Information from many white papers, classes, and the authors? experience has been combined to create this work.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map