- Home
-
Technology
-
- AGILE
- AR/VR TECHNOLOGY
- ARTIFICIAL INTELLIGENCE
- BIG DATA
- BIOMETRIC
- BLOCKCHAIN TECHNOLOGY
- CLOUD
- CYBER SECURITY
- DEVOPS
- DIGITAL TECHNOLOGY
- DIGITAL TRANSFORMATION
- DRONE TECHNOLOGY
- ENTERPRISE ARCHITECTURE
- ENTERPRISE NETWORKING
- ENTERPRISE SECURITY
- ENTERPRISE SOFTWARE
- ENTERPRISE STORAGE
- ENTERPRISE WIRELESS
- INTERNET OF THINGS
- K12 TECHNOLOGY
- MACHINE LEARNING
- MACHINE TO MACHINE
- MANAGED SERVICES
- MOBILITY
- NEXT GEN TECHNOLOGY
- OPENSOURCE
- PROXIMITY TECHNOLOGY
- RFID
- RISK MANAGEMENT
- SOFTWARE TESTING
- SYSTEM INTEGRATION
- UX/UI
- VIRTUALISATION
-
-
Industry
-
- AGRICULTURE
- AUTOMOTIVE
- AVIATION
- BANKING
- BFSI
- CAPITAL MARKET
- CONSTRUCTION
- CONTACT CENTER
- DATA CENTER
- DIGITAL MARKETING
- ECOMMERCE
- EDUCATION
- ENERGY & UTILITY
- ENGINEERING & DESIGN
- ENTERPRISE MOBILITY
- FINANCE
- FINTECH STARTUPS
- FLEET MANAGEMENT
- FOOD & BEVERAGE
- GOVERNMENT & PUBLIC SECTOR
- HEALTHCARE
- INSURANCE
- LEGAL
- MANUFACTURING
- MARINE & PORTS
- MEDIA & ENTERTAINMENT
- MEDICAL
- PHARMA
- PRINT & PACKAGE
- REAL ESTATE
- RETAIL
- SMART BUILDING
- SMART CITY
- SPORTS
- TELECOM
- TEXTILES & APPARELS
- TRANSPORT & LOGISTICS
- TRAVEL & HOSPITALITY
-
-
Solutions
-
- APPLICATION LIFECYCLE MANAGEMENT
- APPLICATION PERFORMANCE MANAGEMENT
- BUSINESS INTELLIGENCE
- BUSINESS PROCESS MANAGEMENT
- CARDS & PAYMENTS
- CUSTOMER EXPERIENCE MANAGEMENT
- CUSTOMER RELATIONSHIP MANAGEMENT
- DESKTOP SOLUTIONS
- DISASTER RECOVERY & BACKUP
- DOCUMENT MANAGEMENT SYSTEM
- ENTERPRISE ASSET MANAGEMENT
- ENTERPRISE CONTENT MANAGEMENT
- ENTERPRISE RESOURCE PLANNING
- FIELD FORCE SOLUTION
- GEOGRAPHIC INFORMATION SYSTEM
- IDENTITY ACCESS MANAGEMENT
- INFRASTRUCTURE MANAGEMENT SERVICES
- IT SERVICES
- LEARNING MANAGEMENT SYSTEM
- MOBILE APP DEVELOPMENT
- POINT OF SALE
- PRODUCT LIFECYCLE MANAGEMENT
- QUALITY MANAGEMENT SYSTEM
- SOFTWARE AS A SERVICE
- TELEMEDICINE
- UNIFIED COMMUNICATION
- VIDEO CONFERENCING
- WI-FI
-
-
Functions
-
Ecosystem
-
Automation
-
Special
- Magazine
- Whitepapers
- Webinar
- About us
-
Fortinet Threat Landscape Report Reveals Attacks Per Firm Increased by 82% By CR Team
-
MaMi - first malware of MacOS in 2018 hits By CIOReview Team
-
Businesses Report All-Time High Levels of Fraud, Cyber, and Security Incidents During 2017 By CIOReview Team
-
Fortinet Threat Landscape Report Reveals Cybercriminals Successfully Using Common Exploits and 'Swarm' Technology to Attack at Speed and Scale By CIOReview Team
-
Threat Predictions for 2018 By CIOReview Team
-
Trend Micro Predicts 2018 Cyberattacks Will Rely on Vulnerabilities By CIOReview Team
-
Fortinet Predicts Highly Destructive and Self-learning "Swarm" Cyber attacks in 2018 By CIOReview Team
-
Fortinet Launches Global Threat Intelligence Service By CIOReview Team
-
Massive GoldenEye ransomware attack affects users worldwide By CIOReview Team
-
WannaCry hits Honda; Halts Japan Car Plant By CIOReview Team
-
Cybercriminals Targeting Mac Users with Malware Attacks By CIOReview Team
-
Guard against WannaCry ransomware By CIOReview Team
-
Android devices to be the top targets for malware attacks and potentially unwanted applications (PUA) says Sophos' malware forecast report By CIOReview Team
-
Accenture Report: Banks Confident in Cybersecurity Capabilities But Lack of Real-World Testing Leaves Gaps in Their Defense By CIOReview Team
-
Tenable Expands Partner Ecosystem and Delivers Better Visibility to Customers with Open and Integrated SaaS Platform By CIOReview Team
-
Just One in Five Banks and Insurers Confident They could Detect a Cyber Security Breach By CIOReview Team
-
Security Management Witnessing Critical Skill Shortage in India By Avi Corfas, Vice President, Asia-Pacific and Latin America, Skybox Security
-
Mobile application security testing: The unique characteristics of device security models By Sanjay Zalavadia, VP of Client Services, Zephyr
-
Securing Cyber World By Navdeep Singh Ahluwalia, Head Network & Information Security, Dalmia Bharat Group
-
Poor Security Hygiene and Risky Applications Enable Destructive Cyberattacks to Spread Infection at Record Pace among APAC Organisations By CIOReview Team
-
Seclore Named Best Data-Centric Security Solution by Cybersecurity Excellence Awards 2017 By CIOReview Team
-
Closing the Cybersecurity Skills Gap - Calling All Women By Michelle Johnson Cobb Vice President, Worldwide Marketing for Skybox Security
-
When the Internet of Things met Analytics By Salil Godika, Chief Strategy & Marketing Officer, Happiest Minds Technologies
-
Embedding Security as a part of SDN system By Subhasish Gupta, Country Manager - India & SAARC, Allied Telesis
-
Go Online to Prevent Cyber Attacks By Sudeep Charles, Product Marketing Manager - Asia Pacific & Japan, Akamai Technologies
-
Maximizing efficiency and Reducing Spend in IT services By Anindo Ganguly, AVP and Head, IT Infrastructure Practice, Sasken Communication Technologies
-
F-Secure Cracking Down on Malicious Content in the Cloud
Leading Analyst Firm Data Once Again Identifies Fortinet as Network Security Market Leader
99tests Included in Gartner's Market Guide for Crowdsourced Applications Testing Services
-
Realities of 'Cyberistic' Future By Mohit Bhishikar, CIO and Mohit Gugale, Cyber Security Expert, Persistent Systems
-
Cyber Security: A Critical Board Level Concern For Enterprises By Sanjay Katkar, Co-Founder, MD & CTO, Quick Heal Technologies
-
Can Data Security protect my Business? - A must ask question for CXO's today. Encryption adoption becomes ever more critical for Enterprises
-
Your network is vulnerable, and so is your data: Increasing role of data-centric DRM amongst enterprises By Abhijit Tannu, CTO, Seclore
-
Fortinet Expands the Security Fabric with Enhanced Software-Defined Wide Area Networking Capabilities By CIO Review Team
-
WannaCry is part of a bigger problem By Rajesh Maurya, Regional Vice President, India & SAARC, Fortinet
-
The 101 of Cyber Security for Small Businesses By Venkatesh Sundar, Co - Founder & CFO, Indusface
-
CIOs Need To Know Their Business-Not Just Tech By John Sadowski, EVP & CIO, Sandy Spring Bank
-
Don't Do Digital Transformation Alone: A Check List for Building Successful and Dynamic Technology Partnerships By Jeff Meier, CIO, Fujitsu Americas
UPCOMING ISSUE
Nominate Now
Editor's Column
WHITEPAPER
Cyber Security
Reducing Total Cost of Ownership with Flash Storage
Cyber Security
Dell Storage SC4020 TCOAnalysis
IT services
DSL-A .NET Implementation
CXO Insights
Four Cybersecurity Trends to Watch Out for in 2023
Sunil Sharma, Managing Director - Sales, India & SAARC, Sophos
Five cybersecurity predictions for 2023
Michael Sentonas, Chief Technology Officer, CrowdStrike
Cybersecurity Technologies to Watch in 2023
Bhaskar Krishnamachari, Engineering Professor and Researcher working on AI/ML, Blockchain and IoT
CIO Viewpoints
Winning The Cyberwar: Are You Well -Equipped?
Manikant R Singh, Chief Information Security Officer, DMI Finance
Enterprise Security? No Easy Talk
Yogendra Singh, Head-IT, Barista
Follow Basics and promote 'End Users' as Cyber security warrior
Arvind Kumar, Head IT, Genisys Group