LogRhythms neue Identity Interference Engine verknüpft Benutzer-IDs mit Security-Ereignissen

  • Published in

LogRhythm 6.2 hilft dabei, auf Cyber-bedrohungen noch schneller und effizienter zu reagieren. Die neue und leistungsstärkere Version der führenden Security-Intelligence-Plattform bietet zudem eine für Mobilgeräte und Web-Browser optimierte Benutzeroberfläche, die alle wichtigen Informationen kompakt präsentiert

Read More

Unzufriedene Kunden durch ineffizientes Papiermanagement

  • Published in

Einer Iron Mountain-Studie zufolge verlieren Unternehmen ihre Kunden, weil sie ihr Papier nicht in den Griff bekommen

Read More

Company culture is holding back the Connected Business, not technology

Enghouse Interactive survey reveals culture and structure is inhibiting the growth of connected businesses, despite most organisations going social.

Read More

Software takes centre stage

New user-vendor forum set to define and promote OpenFlow-based, merchant-optical networking solutions, offering unprecedented orchestration of packet and optical technologies for next-generation data centers and cloud service providers.

Read More

Tech Data Europe appoints SVO, Operations

Johan Vandenbussche will report to Néstor Cano, President Europe.

Read More

Tangled web of IT applications stunts digital transformation

Crowded application landscape is overwhelming IT departments and eroding competitive edge.

Read More

The value of the integrated systems market in Europe, the Middle East, and Africa (EMEA) recorded...
Lookout, Inc. has acquired CipherCloud, a leading cloud-native security company that operates in...
If there’s one thing that 2016 has proved, it’s that cyber threats are relentlessly evolving....
Atos to deliver digital, integrated and cybersecurity solutions to support Siemens digital...
State of Industrial Cybersecurity report reveals only 21% of organizations achieved full maturity...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more