Logo

Proofpoint introduces eDiscovery Analytics

  • Published in

eDiscovery Analytics empowers legal teams with proactive litigation readiness to control cost and risk.

Read More

An appetite for risk?

  • Published in

New paper highlights ability to quantify and manage cyber risk appetite could determine organizations’ success or failure in marketplace.

Read More

New accredited standards will need to follow establishment of GDPR

  • Published in

Standards must be driven by real world and not by lawyers and policy makers.

Read More

NEWS

Most organisations not confident in ability to protect data after data breach

  • Published in

69% of IT professionals are not confident their data would be secure if perimeter defenses were breached.

Read More

Cutting eDiscovery time in half

  • Published in

Druva and DISCO have introduced a new joint solution that reduces the overall time taken to conduct discovery in half.

Read More

Bringing data management and data protection to any enterprise content

  • Published in

Egnyte has launched the first hybrid data governance solution for enterprise, Egnyte Protect. Expanding upon Egnyte’s award winning hybrid EFSS solution, now named Egnyte Connect, Egnyte Protect provides customers visibility, insight, and control over files accessed in any content environment – including popular services like Box, Sharepoint and others.

Read More

Agreement strengthens IS Groups’ cloud service offering by providing its over 30,000...
Juniper Networks, in partnership with the RAND Corporation, a nonprofit institution that helps...
New whitepaper guides organisations to address ISO/IEC 27002 security controls with the CyberArk...
Dramatically enhances visibility, monitoring, and analysis of shadow IT at a global level.
Institute secures its networks and mobile devices using Check Point’s advanced threat...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more