BT puts CA Technologies Identity and Access Management Software at the core of its Cloud Identity Service

CA Technologies and BT have revealed that CA Secure Cloud, CA’s identity and access management (IAM) solution for managed service providers, has been integrated into BT’s new managed identity service, BT Assure Cloud Identity. BT’s service helps protect business data wherever it’s located – in the cloud, on-premise or in hybrid IT systems – using the enterprise-grade IAM capabilities within CA Secure Cloud paired with BT’s extensive managed security...

Read More

2 out of 3 IT pros put systems at risk of downtime and security violations

Netwrix 2015 State of IT Changes Survey reveals that nearly 70% of organisations continue to make undocumented changes and only 50% audit their IT infrastructures.

Read More

RSA ujnveils Via family of smart identity solutions

RSA Via is among the first Smart Identity solutions that is designed to dynamically protect identities from the endpoint to the cloud.

Read More

RSA Security Analytics extends visibility from the endpoint to the Cloud

New pricing and packaging options including throughput-based pricing, subscription services and the ability for customers to leverage existing storage investments.

Read More

HP launches Cloud access security platform

HP’s commitment to data-centric security was demonstrated by its recent acquisition of Voltage Security, a leading provider of high performance tokenization and encryption. With the introduction of the new HP Cloud Access Security Protection platform, HP has now partnered with cloud access security broker Adallom to bring enhanced cloud security monitoring, governance and control capabilities to the portfolio.

Read More

Organisations continue to rely on outdated access controls

Cryptzone has revealed the results of a network security survey conducted with TechValidate. The survey was conducted to determine how organizations are implementing network access control (NAC) policies and security solutions to address today’s environments, given the proliferation of cybercrimes and growing concerns over insider threats.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
The University of St Andrews is seeing stars after being awarded a top honour for its IT provision.
Stakeholders at all levels across the organisation can access the true nature of risks and...
Cybersecurity risks and breaches considered more of a threat to UK businesses (67%) than to...
Long-exploited advanced threat vectors in virtualised environments defeated by security experts.
Gavin Millard, EMEA technical director, Tenable Network Security shares 2016 predictions.
"Mama, I come to the valley of the rich Myself to sell" She said "Son, this is the...