Check Point introduces CPU-level threat prevention solution  

Check Point SandBlast™ introduces CPU-level sandboxing for threat detection and extraction.

Read More

Protecting the flow of sensitive data

ELSEN Group, a German logistics and personnel service provider, sought out a transparent solution with a single interface to help it manage file permissions and security groups. The company’s file shares had grown significantly over time, making it difficult to trace which employees were accessing data ­- and had permission to access what data - across its many departments.

Read More

Intel Security publishes five year threat report

Report provides five-year threat retrospective, GPU malware assessment, and techniques for exfiltrating data from corporate networks; ransomware rises 127% from Q2 2014 to Q2 2015.

Read More

AirGate accesses DDoS protection services

AirGate, provider of Secure Network Services to Canadian enterprises, has begun implementing the Corero SmartWall® Threat Defense System (TDS) to meet customer demands for real-time DDoS mitigation.

Read More

Gigamon teams with RSA  

Gigamon and RSA bring best of breed visibility to Software-Defined Data Centres.

Read More

St. Elizabeth Healthcare improves IT security for connected medical devices

SecurityCenter Continuous View allows Northern Kentucky healthcare leader to preserve patient safety by detecting medical device vulnerabilities.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Vormetric has announced the results of its 2015 Insider Threat Report (ITR), conducted online on...
SecureAuth Corporation has announced the appointment of Nick Mansour as Executive Vice President of...
New research suggests many organisations struggle to obtain high-quality threat data to guide key...
ExtraHop has announced its top predictions for enterprise IT in 2015. Based on insight from...
New research highlights a growing reluctance to pay ransomware demands.
Cisco is advancing its Security Everywhere strategy deeper into the cloud, network, and endpoints...