Security intelligence tracks “canary in the coal mine” to reduce risk of data loss

  • Published in

Skyhigh Networks has released the next edition of its quarterly Cloud Adoption and Risk Report. The Q4 2015 report, derived from analysis of actual cloud usage across over 23 million employees, uncovers how user behaviours put companies at risk and how catching and managing this behaviour can be the proverbial “canary in the coal mine” in reducing the risk of data loss.

Read More

Intelisecure acquires Pentura

  • Published in

InteliSecure now protects the critical assets of more than 500 enterprise customers worldwide with anticipated 2015 revenues in excess of $35M; forecasts a 50 percent annual sales growth rate in the next three consecutive years.

Read More

NEWS

IT departments face obstacles to user mobility

  • Published in

Organizations are challenged to meet demands for greater mobility as 92% of IT departments worldwide still restrict users from accessing sensitive corporate data and resources from mobile devices. This is according to a recent global survey of 900 IT decision makers by Gemalto, a world leader in digital security. Despite almost all organizations (98%) having users who require mobile or remote access, 95% of IT departments are facing obstacles to increased user mobility in their...

Read More

Dell extends end-to-end security offerings

  • Published in

Continued innovation and integration around security solutions provide customers with industry-leading, end-to-end security capabilities.

Read More

Identity vendor delivers Google for Work support

  • Published in

Adds support for Android for Work, Chromebooks and secure remote access to Google Compute Engine virtual servers in Google Cloud Platform, while delivering deeper Google Apps integration.

Read More

Senior management have unrealistic expectations about IT downtime

  • Published in

Report identifies gap between IT and senior management expectations.

Read More

Featuring on-premises, controllable enterprise proxy to securely monitor and process automated...
NTT Com Security has acquired BDG GmbH & Co. KG, an IT security company in Germany.
35% of IT professionals acknowledge that insider threat is biggest risk to networks.
Programm aus hochkarätigen Experten- und Anwendervorträgen erstmalig um IT-Security...
Despite the perception they are too small to target, SMBs are increasingly vulnerable due to...
By Steve Weiner, Offering Manager - Data Centres at Fujitsu UK and Ireland.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more