Q&A: What are the top mobile security enterprise threats of 2015?
Dionisio Zumerle, research director at Gartner, shares his insight into the mobile security enterprise landscape in 2015, including the key threats and trends.
Dionisio Zumerle, research director at Gartner, shares his insight into the mobile security enterprise landscape in 2015, including the key threats and trends.
Sales growth is a primary sales goal in most companies.
Webroot and Exeed partner to deliver cloud-based endpoint protection and collective threat intelligence.
FireEye's global channel boss, Steve Pataky, discusses his company's transition to a channel-led security organisation, and how it is pushing its partners to sell its services in new ways, to non-traditional customers.
If there's one topic that is likely to make any CIO's or IT Manager's wallet hurt, it's information security.
What can you do to reduce the phishing threat?
Web servers, social media and state-sponsored threats dominate the next three years in security threats.
“Palo Alto Networks is a disruptive player in the Asia Pacific enterprise security market."
When recently appointed Veritas head of global channel, Mark Nutt, was in Sydney, he sat down with <i>ARN</i> and spoke about the company’s strategy since its planned spin off from Symantec’s information management business. He also talked about where Veritas plans to hedge its bets in the market. Nutt joined Symantec in 2011 to lead its EMEA strategy and sales operations team and was previously the general manager for a channel partner, Morse.
“For anyone left confused, these announcements prove this is not your father’s EMC."
Advancing a “protection everywhere” strategy for enterprise customers, EMC has announced major updates to its data protection portfolio.
“IT must transform, but a large part of their investment is tied up in legacy infrastructure and applications."
“Every vertical industry, business, and consumer of technology must manage or worry about security on a corporate or personal level."
Operating at the heart of the complicated world of security, one overriding philosophy reins supreme - “You don’t fix complexity with more complexity.”
Microsoft's partner boss discusses Cloud, wine and M&A.
Symantec will begin operating as two separate companies from April 1, potentially leaving New Zealand partners in serious limbo with the move now only weeks away.
Former Homeland Security and NSA consultant Steve Miller discusses the new threats in the market, nation state actors and the sophistication of criminal entities now targeting Australian businesses and government departments.
2014 Hall of Fame inductee, Kate Burleigh, talks openly about the journey to the top and her leadership style.
Westcon Group's newest addition, sales director, David Hook, talks about his new role, what he'll be focusing on and what are some of the hottest trends in business.
<em>The problem with signature based security tools is you are vulnerable until the signature is released and distributed. Palo Alto Networks takes a different approach with Traps, so Network World Editor in Chief John Dix tracked down Palo Alto VP of Product Marketing Scott Gainey for an inside look at how Traps works.</em>