- Agility25
- Analytics12
- API11
- APM1
- Applications361
- AppSec1
- Artificial intelligence37
- Auto financing3
- Auto lending challenges1
- Automation38
- BIg Data6
- Blockchain2
- Business264
- BYOD7
- Cloud487
- Compliance1
- Covid-194
- Customer Experience21
- Data136
- Data Protection49
- Datacenters198
- Datacentre13
- Development1
- Digital42
- Digital Transformation233
- GDPR8
- Healthcare1
- Hybrid Application3
- Hybrid Cloud2
- Hybrid IT16
- Hyperconvergence18
- Innovation1
- Investment2
- IOT30
- IT Infrastructure60
- IT Services23
- IT Transformation53
- Job10
- Management380
- Marketing218
- Mobility166
- Networks332
- Online conference13
- Productivity40
- Ransomware6
- Risk Managment1
- SAP4
- SAP1
- Security447
- Servers2
- Software104
- Solutions21
- Storage32
- Strategy36
- Sustainability1
- Tech91
- Unified Communications3
- Virtualisation22
- Workspace117
- Absolute Software5
- Access It Automation5
- Adobe6
- ADP28
- Aerohive6
- Akamai6
- Alcatel-Lucent Enterprise13
- Alert Logic3
- AMD4
- Amplience6
- APC16
- APC by Schneider Electric Papers2
- Appsense9
- Arbor Networks4
- Arctic Wolf5
- Arkadin3
- Arkeia1
- Arkoon4
- Arrow ECS2
- Aruba Cloud1
- Aruba HPE11
- Aruba Networks14
- Aspera8
- AtTask4
- AuthO2
- Avaya5
- AvePoint3
- Avocent13
- AWS20
- baramundi17
- BEA Systems, Inc.10
- Binary Tree9
- Black Duck Software6
- Bluekiwi1
- BMC6
- British Gas UK3
- BT3
- CA45
- CapeFoxx1
- Capgemini10
- Centrica Business Solution7
- channeladvisor3
- checkout.com1
- Cisco26
- Cisco Intel9
- Citrix50
- Citrix-Microsoft2
- ClickSoftware1
- CloudBlue2
- Cloudera6
- Cognizant3
- Commvault15
- Computer Associates9
- Condusiv Technologies4
- Conga3
- Contentserv1
- Courion3
- CybelAngel4
- Damovo3
- Dataiku1
- Dell - AMD1
- Dell - Intel vPro4
- Dell - Intel Xeon4
- Dell /vmware18
- Dell and Intel Enterprise Resource Centre8
- DELL EMC - MICROSOFT2
- Dell EMC Microsoft 101
- Dell Kace1
- Dell RadeonPro1
- Dell Technologies3
- Dell Technologies - Intel3
- Dell_Intel_built-in3
- Dell_intel-corei71
- Dell-Intel20
- Dell-tech_intel-vPro2
- dell/nutanix8
- DellEmc - Intel22
- DellEMC-XEON-Microsoft4
- Denodo3
- Diligent4
- Diskeeper Corporation Europe1
- Double-take software / Vision Solutions4
- Dropbox8
- Druva5
- Easyvista1
- Eaton Electric1
- Elastic1
- Elastic & Microsoft1
- Electric Cloud1
- EMC14
- Ephesoft1
- Epson1
- Equinix13
- eVault5
- eWEEK Europe4
- Experian3
- F51
- F5 Networks43
- FICO3
- Flexera4
- Forcepoint20
- Forgerock10
- Fortinet20
- Frontrange5
- Gemalto1
- Genesys26
- Genesys - Business Systems6
- Genesys and Connect3
- Genesys and Foehn4
- Genesys and TTEC4
- Gigamon12
- Google1
- GoToMeeting1
- Heat Software1
- Hootsuite3
- Hornetsecurity5
- HP32
- HP / Intel11
- HPE Intel19
- Huawei4
- Ibexa1
- IBM223
- IFS7
- iGrafx1
- Ilex International4
- Imation4
- Imperva6
- Improbable3
- Intel14
- INTEL1
- Intel MRS11
- Intel Security3
- Intel Xeon14
- Intermedia5
- Interxion1
- iPass3
- Ipswitch2
- Ipswitch Whatsup4
- Iron Mountain4
- Jama4
- Juniper6
- Kaminario4
- KnowBe44
- Knowmad Mood3
- Komprise7
- Kyocera1
- LANdesk Software2
- LastPass2
- Lenovo1
- Lifesize2
- Limelight8
- Link111
- Logmein5
- Lombardi3
- Lookout15
- Loopup2
- Lumen2
- Lumension Security6
- Magento5
- Malwarebytes5
- MatsSoft3
- McAfee9
- MicroFocus3
- Microsoft19
- Microsoft US3
- Milkman3
- Mimecast8
- Mitek1
- Mobica4
- MobileIron12
- NaviSite19
- NEC2
- Neo Technology9
- Netapp6
- NetIQ3
- NetMediaEurope10
- Network Instruments1
- Nortel Networks France1
- NPAW4
- Okta51
- OneTrust5
- Opayo5
- Opentext10
- Oracle27
- Orbit Defence1
- Outsystems4
- PagerDuty9
- Palo Alto Networks41
- Panda Security2
- Parallel2
- Percipient1
- Ping Identity1
- plan1
- Plantronics11
- Polycom26
- PTC2
- Pulsant45
- Pure Storage25
- Quadient3
- Quest21
- Quest Software5
- Qumu1
- Rackspace6
- Rakuten1
- Rally Software2
- Recorded Future1
- Red Hat41
- RES Software8
- Response Communications - Aerohive1
- Response Communications - Blue Cat1
- Response Communications - Gigaom1
- Response Communications - Nimble Storage1
- Response Communications - Palo Alto1
- Response Communications - SilverPeak2
- RingCentral1
- Riverbed31
- Rohde & Schwarz2
- Rubrik3
- Safenet4
- Sage Pay11
- Salesforce17
- Samba Nova9
- SAP27
- Savvis2
- Schneider Electric9
- Script Logic3
- SDL8
- Secunia4
- Sempre Analytics1
- Sennheiser1
- SentinelOne1
- ShoreTel2
- Siemens5
- Sierra Wireless2
- SilverPeak7
- Sinequa2
- Sitecore3
- Slack5
- Solarwinds1
- SolidWorks3
- Sonicwall1
- SuccessFactors5
- SugarCRM3
- SUSE6
- Sybase14
- Symantec22
- Syniverse9
- Systancia1
- T-Systems1
- Tableau1
- Talkdesk12
- TCS5
- TCS & Microsoft1
- Telecity1
- Tenable4
- Thawte4
- Toshiba Intel1
- Trend Micro1
- Trifacta1
- Veeam18
- Veracode28
- Veridas2
- VeriSign10
- Veritas11
- Vidyo5
- Virtana6
- VMware116
- VMware AirWatch12
- Vodafone4
- Wallix1
- Webroot25
- Websense7
- WhatsApp1
- Wind River21
- Wind-River10
- Zeenea2
- Ziff Davis Enterprise1
EU-US Data Privacy Framework resource kit
On July 10, 2023, the European Commission adopted its adequacy decision for the EU-US Data Privacy Framework. It came after 18 months of negotiations following the invalidation of its predecessor, the EU-US Privacy Shield. The EU-US DPF restores an important mechanism for the cross-border transfer of personal data and introduces limitations on US surveillance agencies’
EU-US Data Privacy Framework: Your questions answered
The European Commission’s adequacy decision for the EU-US Data Privacy Framework is the latest chapter in the story of trans-Atlantic data transfers. While the adoption of such a decision has been long anticipated, its arrival has thrown up several questions about applicability, certification, impact, and other poignant topics related to the framework. These are your
Securing Industry 4.0: The Convergence of IT and OT
The world is more connected than ever. With the rise of increasingly sophisticated technologies, we are entering what many are hailing as the ‘Fourth Industrial Revolution’ – Industry 4.0. Manufacturing, Utilities, Energy and even Transportation are all being transformed by the increased connectivity this new age has to offer. However, along with the vast benefits
Enloe Medical Center strengthens its security posture and improves efficiency with Unit 42 Managed Detection and Response (MDR)
With Unit 42 MDR service, Cybersecurity team leverages the power of Cortex XDR and security expertise of Unit 42, improving protection, productivity, and morale. IN BRIEF Product and Services: Cortex XDR® Unit 42 Managed Detection and Response (MDR) Unit 42 Retainer Solution: Unit 42 Managed Detection and Response (MDR) Benefits: Risk and exposure significantly reduced
Unify Your Security Strategy with XDR
Gartner® Market Guide for Extended Detection and Response Your Roadmap to a Unified Security Approach By year-end 2028, XDR will be deployed in 30% of end-user organizations to reduce the number of security vendors they have in place, up from less than 5% today.1 Extended detection and response is an evolving technology that promises to deliver
XDR For Dummies
Learn what extended detection and response (XDR) is – and what it isn’t Get the Guide to Boost Your Knowledge of XDR Download this e-book to get up to speed on everything XDR. You’ll become well-versed in all things XDR, including key points such as: The current state of detection and response What XDR is
Surviving Ransomware
How to defend against today’s evolved attacks. Why Ransomware Isn’t Going Anywhere Anytime Soon Ransomware attacks have continued to dominate headlines, and they’re constantly becoming more sophisticated. How has ransomware evolved since it was first recognized around 2005? Who is now more vulnerable to these attacks? What are the top recommendations to mitigate and prevent
Navigating the MDR Landscape
Understand the benefits MDR offers SecOps teams. MDR Performance Matters. Understand the Protection You Need. With MDR services, security teams can enhance their ability to rapidly detect, investigate, and respond to unauthorized and/or suspicious activity. Some MDR solutions also offer threat hunting and recommendations for improving overall security posture. What are the smart ways to
The Essential Guide to MITRE ATT&CK Round 4
Explore Which Solution Is Right for You For Round 4 of the MITRE ATT&CK® Evaluations, 30 vendors participated to see how their solutions stacked up in defending against modern threats. These tests leveraged the tactics, techniques and procedures of two sophisticated threat groups: Wizard Spider and Sandworm. If you’re considering an XDR or EDR vendor, the MITRE ATT&CK Evaluations provide
What Security Teams Want from MDR Providers
Discover How MDR Enhances Security Maturity Cyberthreats are becoming more sophisticated and aggressive, but not every organization has the resources to tackle these threats. You don’t have to fight alone. Managed detection and response (MDR) services have become integral to modern security strategies. They help improve onsite resources and security program maturity. Palo Alto Networks partnered