RSA Security Analytics extends visibility from the endpoint to the Cloud

New pricing and packaging options including throughput-based pricing, subscription services and the ability for customers to leverage existing storage investments.

Read More

HP launches Cloud access security platform

HP’s commitment to data-centric security was demonstrated by its recent acquisition of Voltage Security, a leading provider of high performance tokenization and encryption. With the introduction of the new HP Cloud Access Security Protection platform, HP has now partnered with cloud access security broker Adallom to bring enhanced cloud security monitoring, governance and control capabilities to the portfolio.

Read More

Organisations continue to rely on outdated access controls

Cryptzone has revealed the results of a network security survey conducted with TechValidate. The survey was conducted to determine how organizations are implementing network access control (NAC) policies and security solutions to address today’s environments, given the proliferation of cybercrimes and growing concerns over insider threats.

Read More

Sugar joins BeyondTrust 

Former Northrop Grumman Chairman and CEO Dr. Ronald D. Sugar joins privileged account management and vulnerability management leader

Read More

CipherCloud launches Cloud Discovery Enterprise Edition

Dramatically enhances visibility, monitoring, and analysis of shadow IT at a global level.

Read More

FireMon 'reinvents' Security Monitoring 

FireMon has released a significant advancement of its core platform through the introduction of Security Manager 8.0. Leveraging highly automated analysis and monitoring of security infrastructure, Security Manager 8.0 delivers previously unavailable capabilities to identify and resolve emerging gaps in network defence.

Read More

Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more
McAfee sees attackers shift from mass-spread campaigns to fewer, more lucrative targets.
Integration of RedOwl UEBA with Forcepoint technology delivers holistic view of cyber behaviors to...
Bit9 and Check Point® Software Technologies Ltd. has announced a partnership to integrate the...
The latest trends and insights on mobile and IoT security, DevSecOps, Bug Bounties, OWASP Top Ten...
BeyondTrust's BeyondInsight 5.6 has extended the platform’s ability to provide a holistic...
More than 350 billion data fingerprints are used to automatically detect breaches in minutes.