According to Trend Micro, this volume is expected to exceed one million by the end of 2013.
Indian microfinance company to outsource core business processes and IT management to Accenture.
McAfee comprehensive threat protection allows organisations to find, freeze, and fix advanced malware threats.
By leveraging predictive consumer behavioural intelligence and targeted time-axis campaigns, Pizza Hut attains a consistent sales growth.
Organisational silos are limiting the business benefits of social media, according to TCS Global Trend Report.
The certification allows agencies in NATO countries in all 28 member states across North America and Europe to use BlackBerry 10 smartphones in the office or in the field.
New entry-level Thunder 3030S, 1030S and 930 add 30% increased capacity, 500% higher SSL performance and 10 Gb Ports for next-generation application delivery.
ZeroAccess is a sophisticated and resilient botnet, which has been active since 2011 and is one of the largest known botnets in existence.
The guide provides 20 risk scenario categories with potential responses.
Surface 2 tablets to enhance efficiency, reduce carbon footprint, save $13 million in fuel and associated costs each year.
Enables customers to manage the security of their data and infrastructure - from the device through the network and extending to third-party suppliers.
Indian enterprises can leverage Vodafone's ITFS to address their global business calls.
CA Technologies upgrades it's CA LISA Application Release Automation, intended for large complex enterprise-class releases, to enhance agile application lifecycle workflow.
80% of EMC survey respondents agree that IT is now equipped to handle the most essential business priorities - and that now, the biggest barrier is cultural.
With the launch of the Large Enterprise Edition, OpManager gains an ultrafast discovery engine that discovers 15,000 interfaces or 5,000 devices in a minute.
Android has long been the most popular platform for ordinary users and the cybercriminals who use malware to steal from them.
Tom Scholtz, VP Distinguished Analyst, Gartner explains how even the best of companies tend to miss out on certain aspects of security or they are just not up to satisfactory levels.
Indian economy is facing a tough time. Amidst such an unstable scenario, a serious cyber breach/attack can dent a company's balance sheet and image in a not-so-good way.
Financial services institutions must gain a better understanding of the mobile payments market, according to Ovum.
Centralises all business contacts and enables contact sharing with teams.
BigMatrix 9900 family to support switching capacity of up to 84.48T; designed for large cloud computing and Big Data deployments.
Nokia, under the leadership of interim CEO Risto Siilasmaa, has already begun internal discussions on future strategy, the sources said, adding that a decision could be months away.
Companies must refocus privacy efforts to deal with the impact of the Nexus of Forces.
Relationship focused on delivering effortless and secure network mobility through open standards and application of SDN.
Peter Lees, Principle Technologist, SUSE, explains how open source can be best utilised with other technologies like cloud to accelerate adoption rate.
The platform combines graph-based search and analytics with advanced data integration technology that cuts across data silos.
Reduction in cost, easier endpoint management that desktop virtualisation provides will drive thin client growth, as these are attractive options for cos wanting simpler management.
Local India channel partners are assuming a greater role in the SME server market, says AMI.
Oracle's big memory machines are ideal for in-memory applications and consolidation.
Enhancements include new Whitewater model appliances with up to triple the cache of previous models and support of up to 14.4 petabytes of logical data.