Extending BlackBerry's trusted, gold standard security to separate work and personal data on iOS and Android smartphones and tablets.
38 percent of companies are expected to stop providing devices to workers by 2016, according to a global survey of CIOs by Gartner, Inc.'s Executive Programs.
EMC VMAX, VPLEX and RecoverPoint deliver more protection with significant updates and new integration.
Cloud mobile back-end services provide a specialised form of PaaS to support mobile application development, finds Gartner.
The SAP Mobile Analytics rapid-deployment solution offers preconfigured software, implementation services, content and end-user enablement.
HP ProLiant SL4500 server series will help clients operationalise Big Data, drive new business opportunities and save up to $1 million over three years.
India continues to rank high in the list for even the most basic threats, pointing to an urgent need for improved awareness levels and security measures.
This solution will offer huge cost benefits and time savings as it is extremely simple to install and businesses can transition from their legacy systems to full-blown ERP solutions in a few weeks.
Total worldwide CRM software revenue totaled $18 billion in 2012, up 12.5 percent from $16 billion in 2011.
The hyperconverged network not only presents new opportunities for end users and IT, but also creates new challenges for network and application performance and management.
The company said the attack on its computer systems resulted in unauthorised access to customer data, including names, email addresses, date of birth for some users and "encrypted" passwords.
Organisations can significantly reduce the threat of targeted attacks by proactively securing privileged accounts, according the first APT Privileged Account Exploitation research report.
Dell has unveiled new solutions that help organisations better plan, deploy and manage mobile and BYOD environments to help drive greater business value from their IT investments.
McAfee Identity and Access Management solutions enable IT to regain control of cloud applications.
SMEs are estimated to have spent nearly $45 million in 2012 on Network Security Appliances including Unified Threat Management (UTM), network firewalls and VPN solutions, says AMI.
This product suite provides a simple and effective solution to powerful protection, smooth deployment and manageability for businesses of all sizes.
The solution is built on Cisco and NetApp FlexPod infrastructure based on Cisco Unified Computing System (UCS) technology.
FireEye releases "The Advanced Cyber Attack Landscape" report, that provides a detailed insight into the global nature of malware communication activity related to sophisticated cyber attacks.
One of the most commonly cited motivations for implementing hosted virtual desktops (HVDs) is to increase the security of end-user computing, according to Gartner, Inc.
HP helps enterprises convert customer interactions into revenue opportunities using the SAP Mobile Platform.
New cloud-based platform powered by CA Technologies offers scalable, cost-effective solution for today's evolving networks.
New management capabilities break down barriers between IT, facility and executive stakeholders.
The Ponemon study shows securing web traffic is by far the most significant network security concern for the majority of organisations (64 percent) surveyed.
Subodh Dubey, Group CIO at Usha International talks about how an upgrade to SAP HANA has helped improve BI efficiency and user acceptance of complex reporting and analysis in the company.
Mobile connections will grow to 770 million in 2013, an 11 percent increase from 712 million connections in 2012.
If we are serious about fuelling the growth of BYOD in our offices, we have to relook Wi-Fi and its associated challenges.
IDC's preliminary results show that the Asia/Pacific (excluding Japan) PC market declined 8 percent sequentially and 13 percent year-on-year in 2013 Q1 to reach 26.4 million units.
Sarat Chegu, President, ISACA, in conversation with Biztech2.com explains how IT governance can help in understanding and preventing the misuse of social media.
New Android adware variants - Android.NewyearL.B and Android.Plankton.B have seen a large number of global infections in the past 90 days, finds Fortinet.
Juniper's OpenStack membership is an opportunity to contribute networking expertise to OpenStack Networking, a project to provide networking as a service.