Search this website:



Protecting information and IT systems from unauthorised access, use, disclosure, disruption, modification or destruction. Viruses and hacking would be the two most well-known and, hence, feared, forms of security breach. A whole range of software applications exists that addresses one or more of the types of IT security risk. As the data centre is the hub of an enterprise?s information lifeblood, security is of critical importance.

Security News

28 Sep 2015 | Applications

22 Sep 2015 | Applications

18 Sep 2015 | Applications

18 Sep 2015 | Applications

16 Sep 2015 | Applications

16 Sep 2015 | Applications

14 Sep 2015 | Applications

10 Sep 2015 | Applications

10 Sep 2015 | Applications

8 Sep 2015 | Applications

Read more Security News »

Security TV & Audio

13 Feb 2012 | Servers

Did You Know? Technology Video

We live in the Digital Age, data is being created all around us. This video gives insight to the jaw-dropping statistics about the world that is unfolding before our very eyes!

16 Jan 2012 | Servers

IT Survival Guide - Chapter 1

A humorous guide through the treacherous wilds of IT.

19 Dec 2011 | Storage Networking

The data centre fitness test

Jeremy Wallis, Systems Engineering Director for the UK and Ireland at NetApp, explains the data centre fitness test

More Security DCS TV»

More Security Audio»

Security Web Exclusives

14 Sep 2015 | Applications

31 Aug 2015 | Applications

17 Aug 2015 | Applications

4 Dec 2014 | Applications

Read more Security Web Exclusives»

Security Magazine Articles

June/July 2010 | Design & Facilities Management

  • Arriving At Tier IV

    How customer requirements played a major role in the specification of Europe’s first Uptime Institute Accredited Tier IV Data Centre Design. DCS report... Read more

June/July 2010 | Storage Networking

June/July 2010 | The Cloud

  • Adapt or die

    Magirus has become Cisco’s first specialty data centre distributor in Europe. DCS talks to Christian Magirus, executive vice-president & COO, Magir... Read more

May/June 2010 | Hosting & Colocation

Read more Security Magazine Articles»


Latest IT jobs from leading companies.


Click here for full listings»