Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Why software-defined security is essential in a virtualised environment

    Virtualisation is widely accepted to be the most effective way to improve efficiency and reduce running costs in the data centre. But the issues of security and compliance within a virtualised environment continue to make many enterprise IT managers nervous about the technology.

  • The worst security muddles (so far) of 2012

    From the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches (think LinkedIn, eHarmony, Elantis, VMWare), security muddles have ruled the first half of 2012.

  • Can Fibre Channel survive Ethernet's assault?

    Expensive and specialised Fibre Channel SANs have been under assault as companies consolidate data traffic over Ethernet. With Fibre Channel disks already largely eliminated from the market by SAS, can networking gear be far behind?

  • Intel's Ivy Bridge Processor: Leaner and meaner

    So how will you be able to tell whether you have an Ivy Bridge CPU in your new computer? Look for the "3rd Generation Core Processor" brand name. You can also tell from the model number: Systems with a 3000 number after "Core i5" or "Core i7" use Ivy Bridge, while systems with a 2000 model number are Sandy Bridge. So, a Core i5-2600K, for instance, is a current-generation Sandy Bridge processor, while a Core i5-3550 is a new Ivy Bridge model.

  • Protecting your organisation's intellectual property

    Global healthcare provider Best Doctors employs the most robust technologies and practices available to protect the privacy of its members' personal data - but that's just a part of doing business in this industry. Less obvious but equally important is the degree of vigilance with which the company protects its brand name, which is trademarked in dozens of countries worldwide.

  • Remote access leaving business open to hackers

    Can you use remote access securely?

  • A simple guide to Thunderbolt connection technology

    The arrival of Apple's latest MacBook Pro models brings with it a brand new connection technology called Thunderbolt.

  • Enterprise encryption driven by fear of hacker attack

    A survey of more than 900 IT managers shows that adoption of encryption in their organizations is being driven by two main factors, anxiety about possible cyberattacks and the need to meet the payment-card industry (PCI) data security standards.

  • Managing sensitive data in the cloud

    What does a cloud vendor do to properly segment various types of sensitive data within its cloud? Gregory Machler discusses how to capture the metadata you'll need.

  • How to buy a new PC: The specs

    Once you've determined the type of desktop system you want, a compact PC, a budget system, a mainstream all-purpose model, or a performance crackerjack, you need to know what components to look for.

Featured White Papers

Pain-free and cost effective compliance

As part of its drive towards PCI Data Security Standard compliance, national tool and equipment hire and services firm HSS Hire employs an impressive information security management solution from SureCloud.
Download whitepaper

Using PCI compliance as a business driver

As the cost and burden of Payment Card Industry Data Security Standard (PCI DSS) compliance continues to rise, growing numbers of organisations are looking to outsource the management of their cardholder data.
Download whitepaper

Payment Card Industry basics: What it takes to be compliant

Download this paper to learn more about the challenges faced and how to address them including the basic requirements and how to maintain a compliant and secure IT infrastructure. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Download whitepaper

Shopping for a secure file transfer solution for retail

While security breaches have different causes ? external hacker breaches, insecure data transfer, and network security lapses ? they all have one thing in common: a too-casual approach to data protection.
Download whitepaper

Five challenges to continuous PCI DSS compliance

As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organisations face five major challenges when navigating the PCI compliance landscape.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map