NEWS

Cyber security has to be a C-Level priority

The importance of an integrated IT security strategy is steadily increasing, especially in current pandemic times.

Read More

NEWS

Remote operations lack remote access security

The Internet is the new enterprise corporate network as revealed in Zscaler’s State of digital transformation report 2020 EMEA.

Read More

NEWS

Thales launches Identity Verification Suite

Thales’s Gemalto Identity Verification Suite (IDV) minimizes ID fraud risks by verifying document authenticity so that service providers can digitally check identities of new customers.

Read More

NEWS

Zero trust momentum continues

Survey results released by Enterprise Management Associates and Pulse Secure reports that 60% of organisations have accelerated their Zero Trust projects during the pandemic, while only 15% have slowed down.

Read More

NEWS

BeyondTrust predicts the future

BeyondTrust experts forecast future threat vectors most likely to affect organizations worldwide in the New Year.

Read More

NEWS

Workers 'happy' to open suspicious emails

Mimecast has released new research which highlights the risky behavior of employees using company-issued devices.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
WatchGuard’s Q2 2018 Internet Security Report uncovers heightened use of credential-focused...
New senior executive appointment, updated partner portal, training and certification enhancements...
New Identity as a Service offering manages digital IDs in real time to ensure that only...
New Check Point all-inclusive 23900 appliance delivers maximum protection against...
CyberArk has introduced new behavioral analytics to block and contain advanced threats targeting...
Dramatically enhances visibility, monitoring, and analysis of shadow IT at a global level.