CipherCloud launches Cloud Discovery Enterprise Edition

Dramatically enhances visibility, monitoring, and analysis of shadow IT at a global level.

Read More

FireMon 'reinvents' Security Monitoring 

FireMon has released a significant advancement of its core platform through the introduction of Security Manager 8.0. Leveraging highly automated analysis and monitoring of security infrastructure, Security Manager 8.0 delivers previously unavailable capabilities to identify and resolve emerging gaps in network defence.

Read More

Cloud-based Privileged Identity Service

Centrify has launched Centrify Privilege Service (CPS), said to be the industry’s first cloud-based identity management solution that addresses today’s growing gap in security, visibility and control over privileged accounts. Centrify executives are currently conducting briefings on CPS at RSA, taking place now at San Francisco’s Moscone Center, in booth 415.

Read More

AlienVault works with HP

AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to support more organizations in staying ahead of emerging attacks. As part of the effort, HP intends to integrate data from AlienVault Open Threat Exchange (OTX) into HP Threat Central, its cloud-based threat intelligence sharing and analysis platform. 

Read More

Innovative ICT infrastructure is the foundation of a better connected smart nation

Huawei Rotating CEO shares vision and strategy for an ICT-empowered smart nation.

Read More

Security, reliability and customer service matter most

Managed services providers (MSPs) are more focused than ever on managing endpoints and using remote monitoring and management (RMM) solutions to increase visibility and scale to meet the ongoing demands of managing cloud-based solutions, according to a new Autotask survey of MSPs.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
Ipswitch set out to uncover the biggest issues facing IT departments as 2016 approaches. The...
Lack of internal skills and access to better technology driving UK businesses to partner with...
Bromium has published “Endpoint Exploitation Trends 2015,” a Bromium Labs research report...
New release enables business users to quickly find, understand, enrich and share trusted data...
Business are struggling to cope with a rising number of compliance requirements and this is...
Cloud computing, legacy technology and software licensing cited as biggest contributors to IT...