Our site uses cookies to make it work and to help us give you the best possible user experience. By using our site, you agree to our use of cookies. To find out more about cookies and how you can disable them, please read our cookies statement. 

Cookie Settings

You can manage your cookie settings by turning cookies on and off.

Click on the different cookie  headings to find out more about the types of cookies we use on this site and to change your settings. Please be aware that if you choose to turn off  cookies, certain areas of our site may not work and your browsing experience may be impacted.

For further information on how we use cookies, please see our cookies statement. 

Strictly Necessary Cookies

(Req)

These cookies are essential for the technical operation of and proper functioning of our site  and enable you to register and login, to easily move around our site, and to access secure areas. Without these cookies our site won't function properly.  

These cookies are required

Performance Cookies

Performance cookies allow us to collect aggregated and anonymous data on how our site is used, such as the number of visitors to our site, how you navigate around and the time spent on our site and also to identify any errors in functionality. These cookies also help us to improve the way our site works by ensuring that you can find what you’re looking for easily, to better understand what you are interested in and to measure the effectiveness of the content of our site. 

Marketing Cookies

These cookies allow us to advertise our products to you and allow us to pass this information on to our trusted third parties so that they can advertise our products to you on our behalf. All information these cookies collect is aggregated and therefore anonymous. No personal information is shared to third parties. Any personal information collected while using our website could be used for direct marketing from Dimension Data only.

Dimension Data Blog

Speed train Latest
Blog

The need for the business to thrive sees speed eclipse cost

Digital disruption casts a long shadow over the business landscape. Every organisation believes that it’s under threat and IT leaders need solutions

Read blog
Speeding train Featured
Blog

Speeding into the future of network automation

In our increasingly digital world, the ability to adopt and leverage new technologies is essential in giving organisations a competitive advantage.

Read blog
Two men working
Blog

Cisco Partner Awards reflect our commitment to clients

Cisco recognises our strengths as a partner, I believe that one of the reasons that clients choose us is because of the partner solutions that we offer.

Read blog
Man working on computers
Blog

Protect your data from the inevitable ransomware attack

To cope with this new kind of threat, your backup and recovery strategy needs to adapt.

Read blog
Two men working
Blog

Networking is still king - more so in container projects

Beware: the perfect container solution without appropriate networking may undo any project!

Read blog
Crossroad Highways
Blog

Hybrid commercial models for hybrid IT

There’s a lot of hype around consumption-based pricing in hybrid IT, but the reality in the enterprise market is mixed – and rightly so. I believe hybrid IT calls for hybrid commercial models.

Read blog
People meeting
Blog

How to adapt to the new world of work

The way people work is changing rapidly. In the digital workplace new technology is enabling new workstyles and new work practices.

Read blog
Cityscape
Blog

Why legacy networks are holding back IT innovation

New technology may be the driving force behind a company’s ability to innovate and grow, but IT departments are playing an increasingly smaller role in driving the uptake of technology.

Read blog
Women working at a table
Blog

Don't let location limit your workplace, here's how

Keeping up is a challenge, but if you get it right, the rewards in productivity can be astounding.

Read blog
Long road at night
Blog

Using the dark web to predict and protect against Ransomware

Ransomware attacks have recently emerged as the prominent cybersecurity threat. While this year’s high profile WannaCry and Petya ransomware attacks grabbed the headlines, the threat has been evolving for decades,

Read blog

Recent tweets