NEWS

Key risks for businesses using Cloud Computing in 2015

By the Forensic Risk Alliance (FRA).

Read More

NEWS

Arbor Networks partners with Zycko

Network security provider expands EMEA Distribution Channels.

Read More

Fortinet joins the VMware NSX Partner Ecosystem

Fortinet has joined the VMware NSX™ partner ecosystem and has also revealed its new FortiGate-VMX firewall appliance, which will enable greater security for customers within agile, elastic software-defined data centers based on VMware vSphere and VMware NSX virtualization platforms.

Read More

NEWS

Shadow IT continues to give cause for concern

As cloud computing re-charts the path of enterprise IT, organisations are vastly underestimating the level of shadow IT in their cloud ecosystems. CipherCloud has unveiled the results of the industry’s first comprehensive study of cloud usage and risks from 2014, compiled from enterprise users in North America and Europe. 

Read More

Advanced threat analytics addition

BeyondTrust has launched BeyondInsight Clarity, an advanced threat analytics capability that enables IT and security professionals to identify the data breach threats typically missed by other security analytics solutions. A standard capability of the BeyondInsight management, reporting and analytics console, Clarity pinpoints specific, high-risk users, accounts and assets by correlating low-level privilege, vulnerability and threat data from a variety of BeyondTrust and third-party solutions.

Read More

NEWS

FireHost teams with Dell

FireHost will be teaming with Dell Services to deliver secure, fully managed private cloud services to meet customers’ needs for secure, compliant private cloud environments.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Research reveals UK organisations overwhelmingly using unsupported IT systems.
Thycotic has released the findings from its 2018 VMworld survey of more than 250 IT operations...
Security and risk management leaders must address eight top trends to enable rapid reinvention in...
By Barry Scott, CTO, EMEA at Centrify.
A report published by the Information Commissioner’s Office (ICO) has highlighted the...
Outgunned security executives navigate complex obstacles to keep rising attacks from turning into...