Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • What's new in SharePoint Server 2010

    Project management consultants Campana & Schott describe their experience

  • Why developers like SharePoint 2010

    SharePoint 2010, the newly announced upgrade to Microsoft's popular Web and collaboration platform, is receiving a thumbs-up from developers pleased with the product's capabilities, including its use of Visual Studio as a tool for building SharePoint applications.

  • 5 ways insiders exploit your network

    Data theft and sabotage can result in hard costs, compliance-related problems, legal fees, productivity loss and, possibly most costly, loss of reputation. Here are the five most often-used-methods insiders use to access network resources and how best to avoid them.

  • Turning security into an asset

    We ask RSA Conference sponsors if we should have mandatory breach disclosure laws in Europe, where the network security threats are congregating - and whether companies can ever make money from securing their IT.

  • De-duping - a killer app

    Avamar's Axion re-writes the rules on data de-duplication.

  • Virtualisation is for networks too

    Today's high-end routers offer a range of virtualisation features, allowing large companies to support multiple networks on a single architecture, and even create virtual routers inside one physical router.

  • Encryption: A nice idea few want to implement

    A new survey has revealed that companies are still not using encryption effectively. And all this at a time when stories of data breaches are now commonplace.

  • How managing documents better can help your business

    Document management used to the preserve of the larger corporates but thanks to recent changes to technology, smaller companies can use them. But it's important to realise that they're not an instant cure for archiving problems - it's important to change business practices too.

  • Load balancing your firewalls

    There are all sorts of good reasons to spread the load across multiple firewalls, but it adds complexity too: here's what you need to think about.

  • Can iPass drive down Wi-Fi rates?

    We got the bottom of iPass' pricing, its new technology programme and a controversial security product, with European vice president Doug Loewe

Featured White Papers

In Today?s Web 2.0 Environment, Proactive Security Is Paramount. Are You Protected?

Applications are now enabled over the Internet and the use of corporate intranets and extranets are now critical components of business. Indeed, organizations now build their businesses on Web infrastructures, and we?ve even seen the proliferation of completely ?virtual? companies that have no physical headquarters at all. Today?s business model includes inbound access for remote employees, partners, and customers. Internal employees also reach beyond the edge of the internal network to communicate and gather information across the Internet. This bi-directional aspect of IP-based application access creates significant security challenges for enterprises, however. Communication methods are both inbound and outbound, and so too, threats have also become both inbound and outbound in nature.
Download whitepaper

360 ° Network Access Control with TippingPoint NAC

Protecting enterprise networks from attacks has been improved immeasurably over the past several years. Yet, for all of the deployment of perimeter security firewalls, application security gateways, ID management systems, desktop protection software, and other network security devices, major network breaches leading to loss of personal privacy information, intellectual property and other critical data continue to make headline news.
Download whitepaper

Enterprise Authentication

Enterprise authentication used to be simple: passwords for everyone, tokens for a small number who work remotely. But the world is changing. The workforce is now mobile, with employees accessing the corporate network from hotels, coffee shops and their homes, putting confidential data at risk. New security practices and policies are being rolled out for regulatory compliance, and they all highlight the need for strong authentication.
Download whitepaper

IPSec in the Solaris 9 Operating Environment

The Solaris Operating Environment (OE) is a leading provider of secure network computing capabilities. This lead is extended with the extension of the Internet Protocol Security (IPSec) capabilities in the Solaris 9 OE.
Download whitepaper

In Today?s Web 2.0 Environment, Proactive Security Is Paramount. Are You Protected?

This paper outlines these new threats and discusses the limited effectiveness of legacy Web security solutions against those threats. The paper then outlines the new proactive security paradigm that is necessary for securing Web 2.0 applications and protecting the enterprises that use them on a daily basis.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map