- Agility25
- AI7
- Analytics13
- API11
- APM1
- Applications362
- AppSec1
- Artificial intelligence38
- Auto financing3
- Auto lending challenges1
- Automation38
- BIg Data6
- Blockchain2
- Business276
- BYOD7
- Cloud492
- Compliance1
- Covid-194
- Customer Experience22
- Data139
- Data Protection50
- Datacenters198
- Datacentre13
- Development1
- Digital42
- Digital Transformation247
- GDPR8
- Healthcare1
- Hybrid Application3
- Hybrid Cloud2
- Hybrid IT16
- Hyperconvergence18
- Innovation3
- Investment2
- IOT31
- IT Infrastructure60
- IT Services23
- IT Transformation53
- Job10
- Management387
- Marketing220
- Mobility166
- Networking3
- Networks332
- Online conference13
- Productivity40
- Ransomware12
- Risk Managment9
- SAP4
- SAP1
- Security463
- Servers2
- Software105
- Solutions22
- Storage34
- Strategy38
- Sustainability1
- Tech91
- Unified Communications3
- Virtualisation22
- Workspace117
- Zero Trust2
- 4ALLPORTAL2
- Absolute Software5
- Access It Automation5
- Adobe6
- ADP28
- Aerohive6
- Akamai6
- Alcatel-Lucent Enterprise13
- Alert Logic3
- Alteryx16
- Amazon Business5
- AMD4
- Amplience6
- APC16
- APC by Schneider Electric Papers2
- Appsense9
- Arbor Networks4
- Arctic Wolf5
- Arkadin3
- Arkeia1
- Arkoon4
- Arrow ECS2
- Aruba Cloud1
- Aruba HPE11
- Aruba Networks14
- Aspera8
- AtTask4
- AuthO2
- Avaya5
- Avenga1
- AvePoint3
- Avocent13
- AWS24
- Axis1
- baramundi17
- BEA Systems, Inc.10
- Binary Tree9
- Black Duck Software6
- Bluekiwi1
- BMC6
- British Gas UK3
- BT3
- CA45
- CapeFoxx1
- Capgemini10
- Centrica Business Solution7
- channeladvisor3
- checkout.com1
- Cisco26
- Cisco Intel9
- Citrix50
- Citrix-Microsoft2
- ClickSoftware1
- CloudBlue2
- Cloudera6
- Cognizant3
- Commvault15
- Computer Associates9
- Condusiv Technologies4
- Conga3
- Contentserv1
- Courion3
- CybelAngel4
- Damovo3
- Dataiku1
- Dell - AMD1
- Dell - Intel vPro4
- Dell - Intel Xeon4
- Dell /vmware18
- Dell and Intel Enterprise Resource Centre8
- DELL EMC - MICROSOFT2
- Dell EMC Microsoft 101
- Dell Kace1
- Dell RadeonPro1
- Dell Technologies3
- Dell Technologies - Intel3
- Dell_Intel_built-in3
- Dell_intel-corei71
- Dell-Intel20
- Dell-tech_intel-vPro2
- dell/nutanix8
- DellEmc - Intel22
- DellEMC-XEON-Microsoft4
- Denodo3
- Diligent4
- Diskeeper Corporation Europe1
- Double-take software / Vision Solutions4
- Dropbox8
- Druva5
- Easyvista1
- Eaton Electric1
- Elastic2
- Elastic & Microsoft1
- Electric Cloud1
- EMC14
- Ephesoft1
- Epson1
- Equinix13
- Esker7
- eVault5
- eWEEK Europe4
- Experian3
- F51
- F5 Networks43
- FICO3
- Flexera4
- Forcepoint20
- Forgerock10
- Fortinet22
- Fortinet & Capgemini2
- Frontrange5
- Gemalto1
- Genesys26
- Genesys - Business Systems6
- Genesys and Connect3
- Genesys and Foehn4
- Genesys and TTEC4
- Gigamon12
- Google1
- GoToMeeting1
- Heat Software1
- Hootsuite3
- Hornetsecurity5
- HP32
- HP / Intel11
- HPE Intel19
- Huawei4
- Ibexa1
- IBM223
- IFS7
- iGrafx1
- Ilex International4
- Imation4
- Imperva6
- Improbable3
- Intel14
- INTEL1
- Intel MRS11
- Intel Security3
- Intel Xeon14
- Intermedia5
- Interxion1
- iPass3
- Ipswitch2
- Ipswitch Whatsup4
- Iron Mountain4
- Jama4
- Juniper6
- Kaminario4
- KnowBe44
- Knowmad Mood3
- Komprise7
- Kyocera1
- LANdesk Software2
- LastPass2
- Lenovo1
- Lifesize2
- Limelight8
- Link111
- Logmein5
- Lombardi3
- Lookout15
- Loopup2
- Lumen2
- Lumension Security6
- Magento5
- Malwarebytes5
- MatsSoft3
- McAfee9
- MicroFocus3
- Microsoft19
- Microsoft US3
- Milkman3
- Mimecast8
- Mitek1
- Mobica4
- MobileIron12
- MSG1
- NaviSite19
- NEC2
- Neo Technology9
- Netapp6
- NetIQ3
- NetMediaEurope10
- Network Instruments1
- Nortel Networks France1
- NPAW4
- Okta51
- OneTrust5
- Opayo5
- Opentext10
- Oracle27
- Orbit Defence1
- Outsystems4
- PagerDuty9
- Palo Alto Networks41
- Panda Security2
- Parallel2
- Percipient1
- Ping Identity1
- plan1
- Plantronics11
- Polycom26
- PTC2
- Pulsant45
- Pure Storage25
- Quadient3
- Quest36
- Quest Software8
- Qumu1
- Rackspace6
- Rakuten1
- Rally Software2
- Recorded Future1
- Red Hat41
- RES Software8
- Response Communications - Aerohive1
- Response Communications - Blue Cat1
- Response Communications - Gigaom1
- Response Communications - Nimble Storage1
- Response Communications - Palo Alto1
- Response Communications - SilverPeak2
- RingCentral1
- Riverbed31
- Rohde & Schwarz2
- Rubrik3
- Safenet4
- Sage Pay11
- Salesforce17
- Samba Nova9
- SAP28
- Savvis2
- Schneider Electric9
- Script Logic3
- SDL8
- Secunia4
- Sempre Analytics1
- Sennheiser1
- SentinelOne1
- ShoreTel2
- Siemens5
- Sierra Wireless2
- SilverPeak7
- Sinequa2
- Sitecore3
- Slack5
- Solarwinds1
- SolidWorks3
- Sonicwall1
- Sprinklr4
- Stripe2
- SuccessFactors5
- SugarCRM3
- SUSE6
- Sybase14
- Symantec22
- Syniverse9
- Systancia1
- T-Systems1
- Tableau1
- Talkdesk12
- TCS5
- TCS & Microsoft1
- Telecity1
- Tenable4
- Thawte4
- Toshiba Intel1
- Trend Micro10
- Trifacta1
- Veeam20
- Veracode28
- Veridas2
- VeriSign10
- Veritas11
- Vidyo5
- Virtana6
- VMware116
- VMware AirWatch12
- Vodafone4
- WALLIX2
- Weber1
- Webroot25
- Websense7
- WhatsApp1
- Wind River21
- Wind-River10
- Zeenea2
- Ziff Davis Enterprise1
- Zscaler9
Identity security: 5 critical challenges
In an era where identities have become the primary attack vector for cybercriminals, organizations face constant threats targeting user credentials and identity infrastructure. Systems such as Active Directory and cloud identity platforms like Microsoft Entra ID are frequent targets, and a single compromised identity can lead to widespread breaches, privilege escalation, and costly downtime. This
A “Boom” Model for Cyber Resilience
In today’s digital landscape, every organization faces the risk of a “boom,” a disruptive IT incident caused by cyberattacks, human error, system failures, or misconfigurations. These events can compromise critical systems and bring business operations to a halt. This eBook introduces the BOOM Model, a practical framework for building true cyber resilience by combining two
Disrupting cyberattacks in flight
Cyberattacks are becoming more frequent, more sophisticated, and more damaging. Identity systems such as Active Directory have become prime targets for attackers seeking persistent access and control. Simply detecting and responding after an attack is no longer enough. Organizations need the ability to stop attacks as they happen to prevent disruption and damage. This white
Securing the Edge: How Fortinet & Capgemini Are Powering the Future of OT Cybersecurity
OT security is entering a defining moment. Industrial systems that once ran in isolation are now deeply connected—to cloud platforms, IIoT devices, remote maintenance tools, and enterprise IT. The result? The traditional “air gap” is gone, cyber incidents are rising fast, and many organisations are operating blind inside networks built decades before cybersecurity mattered. In Securing
Increase efficiency, simplify processes and manage media consistently.
In order to maintain a competitive edge, companies need to provide large amounts of product information across online stores, marketplaces, catalogues and other sales channels in a timely and accurate manner. Incomplete or incorrect data can lead to delays, additional work and inconsistencies in product presentation. Consequently, industries such as manufacturing, retail, and e-commerce are
Ensure data quality, optimise processes and provide consistent information.
In today’s business landscape, companies need to provide large amounts of product information across online stores, marketplaces, catalogues, and other sales channels in a timely and accurate manner. Incomplete or incorrect data leads to delays, additional work and inconsistent product presentations. This is why industries such as manufacturing, retail and e-commerce are increasingly turning to
Insights from the 2025 Fortinet State of Operational Technology and Cybersecurity Report
The seventh annual Fortinet State of Operational Technology and Cybersecurity Report is based on a global survey of more than 550 OT professionals. In 2025, the security maturity of OT is improving and although risks continue to escalate, those organizations that invest in cybersecurity are seeing positive results.
2025 State of Operational Technology and Cybersecurity Report
Attacks on OT systems pose a growing risk to industrial operations, critical infrastructure, and human safety. As digital transformation accelerates and the gap between IT and OT environments continues to narrow, legacy systems are increasingly exposed to sophisticated cyber threats. In response, governments and organizations are strengthening cybersecurity regulations and investing in resilience to better
Improve your OT security and resiliency with Capgemini and Fortinet
As digitization accelerates and IT/OT convergence reshapes critical infrastructure, organizations face an urgent need for deeper visibility, stronger control, and resilient security across their OT environments. Yet, despite increased awareness, OT cybersecurity maturity remains inconsistent—leaving many energy and high-value manufacturing organizations exposed to evolving threats and regulatory pressure. The Fortinet & Capgemini Whitepaper explores how
Elevating Efficiency, Resilience and Safety with AI-Powered Scalable Computer Vision Solutions
Accelerated market dynamics, geopolitical uncertainties, and rising costs are key business concernsfor organizations in industrial operations, manufacturing, and logisticstoday. Moreover, in order to avoid the negative impacts of operational failures or shut-downs,such as penalties for order non-fulfilment, costly repairs, or health and safety incidents, ensuring operational resilience has become a key priority for organizations. The