WinMagic delivers unified encryption and key management
  • Posted on 18th April 2018 in by Phil Alsop

WinMagic has launched its latest software release, SecureDoc 8.2.  Purpose-built for a new, unified approach to encryption and key management, SecureDoc 8.2 will enable industry-leading data security across endpoints, data centres, hyper-converged infrastructures and into the cloud...

Read More
Citrix Analytics Service addresses security threats
  • Posted on 18th April 2018 in by Phil Alsop

New Citrix Analytics Service will provide visibility into company-wide user and entity behaviour, system security, performance and operations, and simplify IT infrastructure.

Read More
AlienVault unveils Free threat-scanning service for endpoint devices
  • Posted on 18th April 2018 in by Phil Alsop

AlienVault has launched its OTX Endpoint Threat Hunter™, a free threat-scanning service in the Open Threat Exchange® (OTX™) available to any registered OTX user.

Read More
Helping enterprises transform their security capabilities
  • Posted on 18th April 2018 in by Phil Alsop

Trustwave has unveiled a new cybersecurity consulting practice designed to help enterprises accelerate and bolster their security capabilities as they move toward a more agile and mature security model, so they can contend with a rapidly evolving security threat landscape.

Read More
ABA brings together machine learning and human expertise

Rapid7 has introduced a new capability, Attacker Behaviour Analytics (ABA), in its InsightIDR...

Read More
Consistent security and governance

Hortonworks Data Steward Studio allows enterprises to find, identify, secure and connect data...

Read More
RedLock and Barracuda join forces

RedLock and Barracuda Networks are working together to help organizations fulfill their...

Read More
Centrify brings Zero Trust to DevOps

Centrify Zero Trust Security scales adoption of secure DevOps by integrating Next-Gen Access...

Read More
NEWS
Privileged access concerns

Bomgar’s annual Privileged Access Threat Report highlights that privileged insider and...

Read More
Fortinet delivers integrated NOC-SOC solution

New management and analytics solution integrates Network Operations Center (NOC) and Security...

Read More
NEWS
Alliance for intelligence-driven security

Recorded Future, the leading threat intelligence provider, has introduced Recorded Future Connect...

Read More
Unisys appoints Mathew Newfield as Chief Information Security Officer

Former IBM security leader brings wealth of experience working in both internal and client-facing...

Read More
Cryptomining malware that works outside the web browser on the rise

Check Point’s latest Global Threat Index reveals that hackers are increasingly utilizing...

Read More
Symantec and NTT Security plan strategic partnership

Collaboration aims to strengthen cyber security initiatives as the foundation for digital...

Read More
NEWS
GDPR concern still high

One in three global businesses believe that the impact of GDPR could threaten their...

Read More

Videos

David Malan, Sales Director, DocuWare, provides an overview of Intelligent Document Processing (IDP) – explaining how streamlined, future-proof automation powered by AI could be just the solution an...
In this video we talk to Natal O'Grady from Camfil at DC Ireland 2024
Kenneth Tan, Executive Director at Sardina Systems, Philip Kaye, Co-Founder and Director at Vespertec and Kristófer Andri Kristinsson, Product Manager and Business Development Manager at Borealis Data Center,...
In this video we talk to James Brophy from Everest at DC Ireland 2024

Expert Opinions

BY Ian Ferguson,  Director of Sales, EMEA.
By Alasdair Anderson, VP of EMEA at Protegrity.
By Paul Birkett, VP Strategic Portfolio Management at Ricoh Europe.
By Andy Mills, VP of EMEA, Cequence Security.