Synchronised app control

  • Published in

First firewall to offer complete identification of unknown application traffic by using information directly from the endpoint.

Read More

NEWS

System compromises are now the greatest cyber concern for businesses

  • Published in

Neustar International Security Council (NISC) research reveals cybersecurity threat risk on the rise through unique Cyber Benchmarks Index.

Read More

NEWS

Security plans under scrutiny

  • Published in

New report from SolarWinds MSP outlines a huge opportunity for service providers, with half of businesses planning to outsource security within the year.

Read More

Fortinet expands security fabric visibility and protection

  • Published in

Fortinet has introduced its new FortiGuard Industrial Security Service, extending the Fortinet Security Fabric visibility, control and protection into the Industrial Internet of Things (IIoT).

Read More

Encryption enhances container security

  • Published in

Thales Container Security allows users to meet compliance, regulatory, best practices requirements.

Read More

NEWS

Security, collaboration and development trends driving enterprise app adoption

  • Published in

Cloud video conferencing solution Zoom is the fastest growing app in EMEA within Okta’s network.

Read More

Alpha Generation Distribution, specialising in proactive security solutions will distribute...
Palo Alto Networks has announced enhancements to its enterprise security platform that increase...
Mimecast has published its quarterly Email Security Risk Assessment (ESRA), a report of tests...
First of its kind global report reveals hospitality, telecom industries are most vulnerable to...
New model brings advanced WAN optimisation and integrated content security to remote locations.
Balancing network security with speed, flexibility and ease of use.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more