Wave partners with Intel

Intel self-encrypting drives (SEDs) managed by Wave fill a void for government and enterprise requiring flash-based drives for PCs, Ultrabooks™ and 2 in 1s.

Read More

Only 4% of UK consumers most trust App Developers with personal data

As Internet-connected devices increase in popularity at home and work, consumers express mixed feelings.

Read More

Vaultive Extends ‘Encryption-In-Use’

In response to customer demand for additional cloud enablement and risk mitigation capabilities, Vaultive has announced support for persistent encryption of data stored and processed by major enterprise cloud applications, including Box Enterprise, Yammer, SharePoint Online, SkyDrive Pro, SAP SuccessFactors and Microsoft Dynamics CRM Online. The company also unveiled more extensive support for the Microsoft Office 365 Data Loss Prevention (DLP) and eDiscovery features released as part of the...

Read More

Fujitsu strengthens its global solutions portfolio

Fujitsu and Check Point Software Technologies to jointly market Check Point Integrated Appliance Solutions (IAS) R-Series security appliance selection powered by PRIMERGY.

Read More

(ISC)²® introduces Healthcare security and privacy certification

(ISC)² establishes global standard of competency for healthcare information security and privacy practitioners.

Read More

Rise in fines due to poor information management

30% of senior executives are concerned about how companies in their sector manage and store their information.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Report on government cyber security shows phishing, remote working and election security are common...
Pax8 has formed a new partnership with LogMeIn, providing its industry-leading password management...
New log streaming capabilities deliver 10x the amount of logs for enhanced monitoring and alerting.
Netwrix report reveals that concern about data theft by employees and IT admin mistakes has soared...
RiskIQ has released its annual “Evil Internet Minute” report today. The company tapped...
Institute secures its networks and mobile devices using Check Point’s advanced threat...