Trend Micro Inc., a security software and solutions provider, has announced its collaboration with INTERPOL to support global law enforcement programs against cybercrime.
Teradata offers a single source for all things Hadoop - new products, services, and support making Hadoop easy to deploy and manage.
Cyber-Ark survey discovers that 86% of large enterprises either don't know or had grossly underestimated the magnitude of their privileged account security problem.
The report also identifies an attack tactic employed by the Chinese military group known as "Comment Crew," previously linked to targeted attacks against the U.S. government.
Huawei TE30 is a breakthrough device with major improvements in usability and user experience, it powers the new way of enterprise video communication.
Aspect Workforce Mobile is a mobile application designed to give contact centre agents greater mobile access to Aspect's Workforce Management solution.
The demise of the PC industry's hegemony in the DRAM market reflects a broader trend throughout the electronics business, spurred by the arrival of the post-PC era.
Microsoft has announced the immediate availability of the Windows 8.1 Preview, the next update of the Windows operating system, at the company's developer-focused Build conference.
Enterprises including Whirlpool Corporation and BDO Canada upgrade their mobile deployments to the BlackBerry 10 platform.
New Norton Mobile Insight intelligence technology performs dynamic mobile app analysis, to reveal which ones leak personal information.
According to Kaspersky Lab, 20.64 percent of all phishing threats registered between May 2012 and April 2013 were aimed at accounts of banks and other financial organisations worldwide.
The lion's share of losses is caused by the incident itself - lost opportunities and profits, as well as payments to third-party remediation specialists.
At least sixty percent of information workers will interact with content applications via a mobile device by 2015 finds Gartner.
Symphony Analytics will combine the company's platform and solutions, along with industry-specific expertise, to help enterprises rapidly implement the benefits of Big Data predictive analytics.
Virtustream's IaaS now includes SafeNet portfolio of data protection solutions - encryption, key management, and strong authentication for crypto framework for cloud deployments.
Juniper Networks, has released its third annual Mobile Threats Report showing the rapid growth and evolution of mobile malware into a profitable business for attackers.
The Informatica Platform is now part of the Teradata Unified Data Architecture (UDA), delivering 'map once, deploy anywhere' data integration optimisation.
BlackBerry designed Secure Work Space to meet the management, security and cost needs of the CIO, and the user experience and functionality that employees demand.
The HP Big Data Consulting Practice now offers strategy, design and implementation services that simplify IT management and reduce infrastructure maintenance costs.
With new pay-as-you-go offering, Sophos makes it simple for managed service providers to manage and grow their businesses.
The SAS analytics solutions will help MSTD leverage data-driven decision making in devising policies to maximise tax collection through universal coverage of all eligible tax payers.
Worldwide devices (the combined shipments of PCs, tablets and mobile phones) are projected to reach 2.35 billion units in 2013.
The new solutions deliver all-flash array performance and enable backup-as-a-service using software-defined storage.
The increasing use of web applications in enterprises, along with the rise in cyber attacks, has lent momentum to the web application firewall (WAF) market in Asia-Pacific.
AMD revealed details of its 2014 server portfolio including Accelerated Processing Units, two and four-socket CPUs, and details on what it expects to be the industry's premier ARM server processor.
The S/Gi firewall is offered with F5's BIG-IP Advanced Firewall Manager (AFM), a full-proxy network firewall that can be deployed as a hardware or software-based solution.
In regions like North and South America, Western Europe and Asia-Pacific, the percentage of companies with accurate estimates ranged from 5 percent - 7 percent.
India has launched a wide-ranging surveillance program that will give its security agencies and even income tax officials the ability to tap directly into e-mails and phone calls.
For European insurers frustrated that "cyber crime" policies have so far failed to find a ready market among skeptical companies, hope may be at hand.
For SAP's in-memory platform HANA, will the cost of implementation and maintenance entice enterprises to adopt this relatively new, and sometimes misunderstood, technology?