Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • A clear-eyed guide to Mac OS X's actual security risks

    Apple has improved its security in recent years, but is it enough?

  • Windows 8 security focuses on early malware detection

    Security experts say Windows 8 is the most secure Microsoft OS to date, but that doesn't mean malware won't evolve to exploit it

  • Security concerns over a data centre in the cloud

    When the company data centre moves to various cloud configurations, the provisioning of servers will need to be addressed.

  • Securing your hybrid cloud

    The debate over public cloud versus private cloud continues to rage within the IT industry. As most organisations take an ad-hoc, evolutionary approach to new technologies, the environment over the next five years is likely to be a mixture of the two.

  • Data centre efficiency: The metrics that matter

    Data centre efficiency has become the holy grail of IT professionals. Virtualisation, together with public and private cloud and rising energy costs have changed the nature of enterprise IT, highlighting new opportunities and challenges.

  • Why employees should surf the web at work

    A small business owner might frown on the idea that employees are surfing the web on work time to read about the state of the NBA lockout. But, when done in moderation, giving employees the freedom to roam the Internet can actually help them work better.

  • Postini integration is a big win for Google Apps admins

    Google Apps will become a more secure and easier to manage collaboration and communication suite now that Google has started integrating email security features into it from its Postini suite.

  • The best security features in Windows 7

    Do you understand and use the new security features in Windows 7? From encryption to malware fighters, here's a look at the key Windows 7 tools that keep enterprise and home PCs safe and secure.

  • How a laptop nearly ruined one man's life

    When the Commonwealth of Massachusetts issued Michael Fiola a Dell Latitude in November 2006, it set off a chain of events that would cost him his job, his friends and about a year of his life, as he fought criminal charges that he had downloaded child pornography on to the laptop.

  • Tit for tat

    Everdream and Iron Mountain's DataDefense both have products and services to protect desktop PC and notebook data if the computer is lost or stolen. How do they compare?

Featured White Papers

Network Access Protection

Network Access Protection (NAP) is a security-policy enforcement technology built into Windows Server Longhorn, Windows Vista, and WindowsXP-sp2 that allow a computer administrator to develop and enforce compliance with health policies for network access and communication. NAP provides administrator-defined requirements for system health policy enforcement that help ensure computers connecting to a network or communicates on a network meet these policy requirements. NAP also provides an Application Programming Interface (API) to help administrators, developers and vendors enforce compliance with health policies for network access and communication.
Download whitepaper

Securing Data Transmission on Metro Ethernet Networks

In the early days of networking, when Ethernet was used simply to connect workgroup LANs, a concept of network security emerged that was based on a ?crunchy shell around a soft, chewy center.? This addressed the emerging threats created when opening up a door between the workgroup LANs by encouraging the hardening of the LAN perimeter. By focusing on the idea that the network is self-contained, and therefore safe, security meant mainly guarding that door.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map