Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Security-vendor snake oil: 7 promises that don't deliver

    Beware bold promises from a multibillion-dollar industry that can't prevent your IT systems from being routinely hacked

  • Greed is good: 9 open source secrets to making money

    Low-cost marketing, hard bargains, keeping competitors in check -- profiteering abounds in the open source community

  • Why software-defined security is essential in a virtualised environment

    Virtualisation is widely accepted to be the most effective way to improve efficiency and reduce running costs in the data centre. But the issues of security and compliance within a virtualised environment continue to make many enterprise IT managers nervous about the technology.

  • Top security threats in 2013: Mobile attacks

    For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?

  • Is this program malware or a false positive?

    Davikokar launched a program even though Norton warned that it was a Trojan. A subsequent hard drive scan revealed nothing bad. Davikokar then asked the Antivirus & Security Software forum if Norton had given a false positive?

  • Mobile and BYOD - Lessons from successful deployments

    Businesses across the UK are in the midst of a major change, affecting the technology they use and transforming their key processes. A dramatic growth in mobile computing for employees is here, with a plethora of devices requiring close management.

  • From the security manager's journal: Time for a mobile-security upgrade

    A flood of mobile devices into the enterprise is exhausting available licenses for mobile-device security. But there are great options available today that didn't exist two years ago.

  • The dangers of embedded system security

    Experts say embedded device manufacturers too often lack maturity when it comes to designing secure embedded systems.

  • Why small business is a prime target for hackers

    If you run a small business, and think that none of your data was of interest to a hacker, consider this: what if a hacker could take stolen bank account or credit card information from your computer and package it with the same information from a hundred or a thousand other small businesses? Would it be worth something then?

  • Making remote working work for you

    Given the upside of mobile and remote working, it is surprising that firms can still put up barriers to these arrangements, be they technical, logistical and cultural. A survey by Forrester showed just 13% of information workers believe their company encourages them to work remotely.

Featured White Papers

Endpoint protection cloud vs. seven traditional endpoint security products

PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) from December 2011 to January 2012. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot?s SecureAnywhere Endpoint Protection cloud product with seven (7) Traditional Endpoint Security competitor products.
Download whitepaper

Email and Web Security SaaS

This in-depth analysis examines functionality, operation and product strategy of Webroot?s email and web security software-as-a-service solutions.
Download whitepaper

Enhancing Performance with Disk Defragmentation

The approach of this report is to display the improvement in antivirus and anti-spyware utility scan times (speed) before and after defragmentation using Diskeeper 2007.
Download whitepaper

Bridging the network security gap

Enterprises must take a robust policy-driven approach to enforcing security compliance in order to protect against network vulnerabilities and meet regulatory requirements. This paper examines technology and initiatives designed to capitalize on existing investments and prevent any gaps in security.
Download whitepaper

Front-line Malicious Code Defense for the Enterprise from a Single Management Console

This white paper discusses how the new LANDesk® Antivirus solution, available as an add-on to LANDesk® Management Suite and LANDesk Security Suite, provides a competitively priced, front-line malware and malicious code defense (viruses, Ttrojans, worms, spyware, rootkits, etc.) for all network endpoints.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map