Search

IT News

FCC's net neutrality notice: What's in it?

The U.S. Federal Communications Commission voted Thursday to release a controversial proposal to restore net neutrality rules and seek public comment on a number of ways to proceed after a U.S. appeals court threw out the agency's old rules in January....

20.05.2014

Symantec tailors sharper small business security suite

Symantec's latest product, Norton Small Business, is perhaps the most well-rounded offering the company has inserted into its product array for small companies....

20.05.2014

Microsoft's money pit: Surface has lost $1.2B

Microsoft has lost more than $1.2 billion so far on its Surface tablet business, an expensive experiment that makes tomorrow's revelations of new hardware an important milestone for the "devices" side of its corporate-refashioning strategy....

20.05.2014

Symantec tailors sharper small business security suite

Symantec's latest product, Norton Small Business, is perhaps the most well-rounded offering the company has inserted into its product array for small companies....

20.05.2014

How to take the mystery out of Wi-Fi using performance management tools

Many IT departments still treat Wi-Fi like a second-class infrastructure asset despite the cultural shift toward mobility. Perhaps the reluctance to embrace Wi-Fi with open arms is due to a lack of visibility. ...

20.05.2014

Symantec tailors sharper small business security suite

Symantec's latest product, Norton Small Business, is perhaps the most well-rounded offering the company has inserted into its product array for small companies....

20.05.2014

Check Point builds seven-armed threat-intelligence sharing alliance

Check Point Software Technologies today announced an alliance with seven security firms to make use of their threat-intelligence feeds and fee data from those sources into Check Point security gateways to block attacks....

20.05.2014

Symantec tailors sharper small business security suite

Symantec's latest product, Norton Small Business, is perhaps the most well-rounded offering the company has inserted into its product array for small companies....

20.05.2014

Check Point builds seven-armed threat-intelligence sharing alliance

Check Point Software Technologies today announced an alliance with seven security firms to make use of their threat-intelligence feeds and fee data from those sources into Check Point security gateways to block attacks....

20.05.2014

Check Point builds seven-armed threat-intelligence sharing alliance

Check Point Software Technologies today announced an alliance with seven security firms to make use of their threat-intelligence feeds and fee data from those sources into Check Point security gateways to block attacks....

20.05.2014

    SERVICES

  • - Consultancy and technical support
  • - Marketing support
  • - Training
eXTReMe Tracker