Vormetric introduces Cloud Partner Programme

Vormetric has announced the Vormetric Cloud Partner programme. Created specifically to address the needs of service providers, the programme enables partners to easily incorporate Vormetric Data Security into their offerings enabling strong differentiation for existing services and the creation of new, higher margin, value-added solutions. Included in the programme are the Vormetric services, pricing and training for products that Cloud Service Providers, Hosting Providers, Managed Service...

Read More

Data security storm brewing

According to SailPoint’s Annual Market Pulse Survey, cloud applications and mobile devices are creating an unparalleled level of risk for enterprises in the UK. Alarmingly, the survey reveals that while enterprises are embracing – and in some instances mandating – these new technologies, they do not have IT controls in place to properly manage them, putting themselves at an increased risk of a security breach. In fact, in the last year, 52% of the respondents have experienced...

Read More

Imperva discovers emerging attack vector

Imperva, Inc. has released its latest Hacker Intelligence Initiative report, “Assessing the Threat Landscape of DBaaS.” Through an in-depth analysis of malware that used a shared hosting database for its Command and Control and drop server, Imperva discovered a new malware platform for cybercriminals: Database as a Service (DBaaS). The report concludes that by bringing data one step closer to hackers, DBaaS makes it possible for hackers to compromise an organization’s database...

Read More

Empowering customers to tackle BYOD, Big Data and security concerns

Dell Software has announced technology innovations that address a host of pressing IT challenges. New solutions and technology integrations within Dell’s mobility/BYOD offerings provide customers the tools to increase workforce productivity, while also ensuring secure control over corporate assets. Continued integration of Dell’s network security and identity and access management technologies further enhances security for users, regardless of location or access need, while...

Read More

Stonesoft and Tufin deliver integrated security management

The cyber security expert Stonesoft, a McAfee Group Company, and Tufin Technologies, the market leading provider of Security Policy Orchestration solutions, today announced the completion of the first phase of the integration of their management interfaces. The joint solution combines Stonesoft’s contextual awareness with Tufin’s security policy orchestration to provide joint customers with enhanced network security controls and a more holistic approach to managing increasingly...

Read More

Interoute attains a combined ISAE 3402 /SSAE 16 Type II assurance report

Interoute has completed the ISAE 3402 and SSAE 16 type II assurance report for its Amsterdam, Berlin, Geneva and London Data Centre operations. The report was completed by PricewaterhouseCoopers (PwC), one of the world’s leading risk assurance consultancies, through a six month sampling audit across seven fundamental security and risk control areas. The report demonstrates Interoute's commitment to protecting the security and quality of business critical applications and data for...

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Infoblox and its Cyber Intelligence Unit (CIU) have released the latest iteration of the...
Study shows organisations are managing more than ten times the amount of data than they did five...
While only a third say regulatory change triggers purchase of new technology.
Cyber threat causes most concern for businesses, with US executives feeling more prepared to handle...
New CloudFlow solution enables organizations to seamlessly manage security control layers across...
Record-breaking 20 million active phishing Reporters and 100+ million phishing simulations inform...