NEWS
Turning security intelligence into protection
  • Posted on 2nd March 2016 in by Phil Alsop

Companies need more than endpoint protection to stay secure in an increasingly complex cyber-threat landscape and Kaspersky Lab is launching two new enterprise security solutions that will help to meet this need.

Read More
Privileged security
  • Posted on 2nd March 2016 in by Phil Alsop

Bomgar Vault helps companies secure, manage, and administer shared credentials for privileged users and IT vendors.

Read More
IoT encryption and authentication
  • Posted on 2nd March 2016 in by Phil Alsop

Cryptosoft to leverage Symantec’s Roots of Trust and device certificates to secure IoT devices.

Read More
Advancing sandboxing beyond threat detection
  • Posted on 1st March 2016 in by Phil Alsop

Industry-first, multi-engine approach to advanced threat analysis—that also supports prevention—delivers critical layer of defense to protect organizations from increasing dangers of unknown threats identified in the Dell Security 2016 Threat Report.

Read More
Ensuring email security and compliance

Fidelis email security for Office 365 ensures email security and compliance with improved...

Read More
How well does your business or organisation look after customers’ personal information?

Data breaches, cyber security, identity theft - recently the news has been full of stories...

Read More
Open Threat Exchange update

AlienVault has introduced a new, enhanced version of Open Threat Exchange™ (OTX), its open...

Read More
Making intelligence driven security a reality

ThreatStream has changed the company name to Anomali and launched two new products.

Read More
Fortinet launches Cyber Threat Assessment Program

Analysis of enterprises piloting the program shows that social media and application control...

Read More
Cross-Cloud visibility and data protection

Cloud Security Broker delivers 360-degrees user behaviour analytics, threat detection, compliance...

Read More
Endpoint protection built for Linux Servers

Platform combines best-in-class detection, prevention and remediation against...

Read More
Gemalto expands data protection ecosystem

Enterprises can seamlessly protect data and secure access to hundreds of IT applications,...

Read More
Harrowells Solicitors selects SMS PASSCODE to secure remote working

Harrowells Solicitors, the Yorkshire-based law firm, is working with Danish authentication...

Read More
Extending network forensics

Savvius has released Savvius Vigil 2.0™, a powerful new version of the innovative security...

Read More
ServiceNow reinvents security response

ServiceNow is extending its industry-leading automation and orchestration expertise to transform...

Read More

Videos

Pierre-Adrien Bel, Product Manager - large generator set and sustainable solutions at Rehlko, explains how the company has provided Data4, a major European data centre, operator with crucial data on the...
David Malan, Sales Director, DocuWare, provides an overview of Intelligent Document Processing (IDP) – explaining how streamlined, future-proof automation powered by AI could be just the solution an...
Dr. Michael Förtsch, CEO of Q.ANT, discusses the company's first commercial product - a photonics-based Native Processing Unit (NPU) built on the its compute architecture LENA - Light Empowered Native...
Tal Eisner, Guardz VP of Product Marketing, discusses the findings of the company’s recent MSP survey, which are that MSPs are juggling as many as 10 cybersecurity point solutions to protect their SMB...

Expert Opinions

By Isaac Douglas, CRO, servers.com.
By Carsten Ludwig, Market Manager DC, Reichle & De-Massari AG.
By Jim Cassens, CEO, Perforce.
By Ben Pritchard, CEO, AVK.