Infrastructure & connectivity for the Data Centre and IT Network

Computer systems merely free up space from deleted files or records and do not remove the acutal data. This is a big security and privacy risk - You need CyberScrub.

Our aim is to enable our customers to be successful by maximising the potential of existing data and applications. This provides rapid return on investment, reduced costs, improved productivity and efficiency, and the ability to manage operational risk.

Millions, if not billions, of pounds are spent each year in securing valuable or sensitive data.  From firewalls to anti-phishing software, organisations invest heavily in keeping electronic data safe. Ironically, however, many then leave themselves open to fraud and identity theft by less sophisticated, physical means.  Anthony Pearlgood, commercial director of confidential shredding experts PHS Datashred, explains the ways in which this danger presents itself, plus how to go about avoiding the risk of confidential information and business assets falling into the wrong hands, by appropriate data waste management.

Quantum Corporation’s international product marketing manager, Mark Galpin, discusses data backup, recovery and protection

Quantum Corporation’s international product marketing manager, Mark Galpin, discusses data backup, recovery and protection

What is a CoCo? Government Connect has the answer

Data protection lies at the heart of the latest e-government initiatives. Two-factor authentication solutions can ensure that access to data held on public sector networks is controlled securely

Working in partnership with agencies across the criminal justice arena, STL Technologies understand the business processes associated with the sector

Toby Scott-Jackson, Head of Compliance Services, at SureCloud Limited, gives his tips on how to achieve GCSx CoCo and PCI DSS compliance

Cable&Wireless has introduced a new consultancy package to help local authorities meet the Code of Connection compliance deadline

Moving from PAF to NLPG address data is now much simpler

EVault offers tips for successful data protection and recovery planning at Storage Expo

By Nick Hughes, Business Development Manager, 3M’s Optical Systems Division

Secure cross-domain solutions from Tenix Datagate help information to be passed securely between networks

Pages

Supplier Profiles

Awesome Apps

While 3D printing is becoming more widely used in general engineering the use of 3D printing in the medical and allied sectors such as dentistry has only just begun.